Jul 2 07:56:08.192655 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 07:56:08.192705 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:56:08.192725 kernel: BIOS-provided physical RAM map: Jul 2 07:56:08.192739 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Jul 2 07:56:08.192751 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Jul 2 07:56:08.192765 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Jul 2 07:56:08.192787 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Jul 2 07:56:08.192800 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Jul 2 07:56:08.192813 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Jul 2 07:56:08.192825 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Jul 2 07:56:08.192839 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Jul 2 07:56:08.192853 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Jul 2 07:56:08.192866 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Jul 2 07:56:08.192881 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Jul 2 07:56:08.192903 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Jul 2 07:56:08.192919 kernel: NX (Execute Disable) protection: active Jul 2 07:56:08.192934 kernel: efi: EFI v2.70 by EDK II Jul 2 07:56:08.192959 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd2d2018 Jul 2 07:56:08.192975 kernel: random: crng init done Jul 2 07:56:08.192989 kernel: SMBIOS 2.4 present. Jul 2 07:56:08.193003 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Jul 2 07:56:08.193018 kernel: Hypervisor detected: KVM Jul 2 07:56:08.193038 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 2 07:56:08.193052 kernel: kvm-clock: cpu 0, msr 18b192001, primary cpu clock Jul 2 07:56:08.193068 kernel: kvm-clock: using sched offset of 12909425792 cycles Jul 2 07:56:08.193085 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 2 07:56:08.193101 kernel: tsc: Detected 2299.998 MHz processor Jul 2 07:56:08.193117 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 07:56:08.193133 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 07:56:08.193148 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Jul 2 07:56:08.193164 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 07:56:08.193180 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Jul 2 07:56:08.193200 kernel: Using GB pages for direct mapping Jul 2 07:56:08.193215 kernel: Secure boot disabled Jul 2 07:56:08.193231 kernel: ACPI: Early table checksum verification disabled Jul 2 07:56:08.193256 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Jul 2 07:56:08.193272 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Jul 2 07:56:08.193288 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Jul 2 07:56:08.193304 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Jul 2 07:56:08.193319 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Jul 2 07:56:08.193348 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Jul 2 07:56:08.193365 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Jul 2 07:56:08.193383 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Jul 2 07:56:08.193399 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Jul 2 07:56:08.193414 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Jul 2 07:56:08.193445 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Jul 2 07:56:08.193466 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Jul 2 07:56:08.193482 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Jul 2 07:56:08.193499 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Jul 2 07:56:08.193516 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Jul 2 07:56:08.193533 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Jul 2 07:56:08.193550 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Jul 2 07:56:08.193567 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Jul 2 07:56:08.193583 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Jul 2 07:56:08.193600 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Jul 2 07:56:08.193622 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Jul 2 07:56:08.193639 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Jul 2 07:56:08.193656 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Jul 2 07:56:08.193673 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Jul 2 07:56:08.193690 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Jul 2 07:56:08.193706 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Jul 2 07:56:08.193724 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Jul 2 07:56:08.193741 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Jul 2 07:56:08.193758 kernel: Zone ranges: Jul 2 07:56:08.193780 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 07:56:08.193797 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jul 2 07:56:08.193813 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Jul 2 07:56:08.193829 kernel: Movable zone start for each node Jul 2 07:56:08.193846 kernel: Early memory node ranges Jul 2 07:56:08.193862 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Jul 2 07:56:08.193879 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Jul 2 07:56:08.193897 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Jul 2 07:56:08.193914 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Jul 2 07:56:08.193936 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Jul 2 07:56:08.193964 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Jul 2 07:56:08.193981 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 07:56:08.193997 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Jul 2 07:56:08.194014 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Jul 2 07:56:08.194031 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Jul 2 07:56:08.194055 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Jul 2 07:56:08.194073 kernel: ACPI: PM-Timer IO Port: 0xb008 Jul 2 07:56:08.194089 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 2 07:56:08.194111 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 2 07:56:08.194127 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 2 07:56:08.194144 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 07:56:08.194161 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 2 07:56:08.194177 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 2 07:56:08.194194 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 07:56:08.194209 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Jul 2 07:56:08.194227 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Jul 2 07:56:08.194243 kernel: Booting paravirtualized kernel on KVM Jul 2 07:56:08.194265 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 07:56:08.194282 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Jul 2 07:56:08.194299 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Jul 2 07:56:08.194316 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Jul 2 07:56:08.194332 kernel: pcpu-alloc: [0] 0 1 Jul 2 07:56:08.194348 kernel: kvm-guest: PV spinlocks enabled Jul 2 07:56:08.194364 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 2 07:56:08.194380 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932280 Jul 2 07:56:08.194396 kernel: Policy zone: Normal Jul 2 07:56:08.194419 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:56:08.194457 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 07:56:08.194473 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Jul 2 07:56:08.194489 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 07:56:08.194505 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 07:56:08.194523 kernel: Memory: 7516812K/7860584K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 343512K reserved, 0K cma-reserved) Jul 2 07:56:08.194540 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 07:56:08.194557 kernel: Kernel/User page tables isolation: enabled Jul 2 07:56:08.194579 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 07:56:08.194596 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 07:56:08.194613 kernel: rcu: Hierarchical RCU implementation. Jul 2 07:56:08.194631 kernel: rcu: RCU event tracing is enabled. Jul 2 07:56:08.194648 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 07:56:08.194666 kernel: Rude variant of Tasks RCU enabled. Jul 2 07:56:08.194683 kernel: Tracing variant of Tasks RCU enabled. Jul 2 07:56:08.194700 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 07:56:08.194717 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 07:56:08.194736 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Jul 2 07:56:08.194767 kernel: Console: colour dummy device 80x25 Jul 2 07:56:08.194785 kernel: printk: console [ttyS0] enabled Jul 2 07:56:08.194807 kernel: ACPI: Core revision 20210730 Jul 2 07:56:08.194825 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 07:56:08.194843 kernel: x2apic enabled Jul 2 07:56:08.194860 kernel: Switched APIC routing to physical x2apic. Jul 2 07:56:08.194877 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Jul 2 07:56:08.194895 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Jul 2 07:56:08.194913 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Jul 2 07:56:08.194935 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Jul 2 07:56:08.194960 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Jul 2 07:56:08.194978 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 07:56:08.194995 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Jul 2 07:56:08.195013 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Jul 2 07:56:08.195030 kernel: Spectre V2 : Mitigation: IBRS Jul 2 07:56:08.195052 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 07:56:08.195070 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jul 2 07:56:08.195087 kernel: RETBleed: Mitigation: IBRS Jul 2 07:56:08.195105 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 2 07:56:08.195122 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Jul 2 07:56:08.195141 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 2 07:56:08.195158 kernel: MDS: Mitigation: Clear CPU buffers Jul 2 07:56:08.195176 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Jul 2 07:56:08.195194 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 2 07:56:08.195215 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 2 07:56:08.195232 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 2 07:56:08.195257 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 2 07:56:08.195275 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jul 2 07:56:08.195293 kernel: Freeing SMP alternatives memory: 32K Jul 2 07:56:08.195310 kernel: pid_max: default: 32768 minimum: 301 Jul 2 07:56:08.195327 kernel: LSM: Security Framework initializing Jul 2 07:56:08.195345 kernel: SELinux: Initializing. Jul 2 07:56:08.195362 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:56:08.195384 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:56:08.195402 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Jul 2 07:56:08.195420 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Jul 2 07:56:08.209888 kernel: signal: max sigframe size: 1776 Jul 2 07:56:08.209924 kernel: rcu: Hierarchical SRCU implementation. Jul 2 07:56:08.209944 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jul 2 07:56:08.209970 kernel: smp: Bringing up secondary CPUs ... Jul 2 07:56:08.209989 kernel: x86: Booting SMP configuration: Jul 2 07:56:08.210007 kernel: .... node #0, CPUs: #1 Jul 2 07:56:08.210035 kernel: kvm-clock: cpu 1, msr 18b192041, secondary cpu clock Jul 2 07:56:08.210054 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Jul 2 07:56:08.210075 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Jul 2 07:56:08.210093 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 07:56:08.210110 kernel: smpboot: Max logical packages: 1 Jul 2 07:56:08.210129 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Jul 2 07:56:08.210147 kernel: devtmpfs: initialized Jul 2 07:56:08.210166 kernel: x86/mm: Memory block size: 128MB Jul 2 07:56:08.210184 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Jul 2 07:56:08.210206 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 07:56:08.210224 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 07:56:08.210242 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 07:56:08.210261 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 07:56:08.210279 kernel: audit: initializing netlink subsys (disabled) Jul 2 07:56:08.210297 kernel: audit: type=2000 audit(1719906966.548:1): state=initialized audit_enabled=0 res=1 Jul 2 07:56:08.210315 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 07:56:08.210332 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 07:56:08.210351 kernel: cpuidle: using governor menu Jul 2 07:56:08.210373 kernel: ACPI: bus type PCI registered Jul 2 07:56:08.210390 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 07:56:08.210408 kernel: dca service started, version 1.12.1 Jul 2 07:56:08.210426 kernel: PCI: Using configuration type 1 for base access Jul 2 07:56:08.210458 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 07:56:08.210477 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 07:56:08.210495 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 07:56:08.210512 kernel: ACPI: Added _OSI(Module Device) Jul 2 07:56:08.210530 kernel: ACPI: Added _OSI(Processor Device) Jul 2 07:56:08.210553 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 07:56:08.210571 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 07:56:08.210589 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 07:56:08.210607 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 07:56:08.210625 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 07:56:08.210644 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Jul 2 07:56:08.210662 kernel: ACPI: Interpreter enabled Jul 2 07:56:08.210679 kernel: ACPI: PM: (supports S0 S3 S5) Jul 2 07:56:08.210697 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 07:56:08.210719 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 07:56:08.210738 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Jul 2 07:56:08.210756 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 2 07:56:08.211029 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Jul 2 07:56:08.211206 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Jul 2 07:56:08.211231 kernel: PCI host bridge to bus 0000:00 Jul 2 07:56:08.211399 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 2 07:56:08.211573 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 2 07:56:08.211725 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 2 07:56:08.211898 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Jul 2 07:56:08.212058 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 2 07:56:08.212258 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Jul 2 07:56:08.212466 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Jul 2 07:56:08.212659 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Jul 2 07:56:08.212829 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Jul 2 07:56:08.213018 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Jul 2 07:56:08.213245 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Jul 2 07:56:08.213412 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Jul 2 07:56:08.213618 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jul 2 07:56:08.213780 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Jul 2 07:56:08.213961 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Jul 2 07:56:08.214132 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Jul 2 07:56:08.214293 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Jul 2 07:56:08.215165 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Jul 2 07:56:08.215204 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 2 07:56:08.215222 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 2 07:56:08.215239 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 2 07:56:08.215263 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 2 07:56:08.215279 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jul 2 07:56:08.215296 kernel: iommu: Default domain type: Translated Jul 2 07:56:08.215312 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 07:56:08.215342 kernel: vgaarb: loaded Jul 2 07:56:08.215362 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 07:56:08.215381 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 07:56:08.215399 kernel: PTP clock support registered Jul 2 07:56:08.215417 kernel: Registered efivars operations Jul 2 07:56:08.215451 kernel: PCI: Using ACPI for IRQ routing Jul 2 07:56:08.215467 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 2 07:56:08.215510 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Jul 2 07:56:08.215530 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Jul 2 07:56:08.215547 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Jul 2 07:56:08.215564 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Jul 2 07:56:08.215581 kernel: clocksource: Switched to clocksource kvm-clock Jul 2 07:56:08.215598 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 07:56:08.215616 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 07:56:08.215638 kernel: pnp: PnP ACPI init Jul 2 07:56:08.215656 kernel: pnp: PnP ACPI: found 7 devices Jul 2 07:56:08.215673 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 07:56:08.215691 kernel: NET: Registered PF_INET protocol family Jul 2 07:56:08.215708 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 2 07:56:08.215726 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Jul 2 07:56:08.215743 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 07:56:08.215761 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 07:56:08.215778 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Jul 2 07:56:08.215799 kernel: TCP: Hash tables configured (established 65536 bind 65536) Jul 2 07:56:08.215817 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Jul 2 07:56:08.215834 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Jul 2 07:56:08.215851 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 07:56:08.215869 kernel: NET: Registered PF_XDP protocol family Jul 2 07:56:08.216060 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 2 07:56:08.216209 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 2 07:56:08.216353 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 2 07:56:08.216516 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Jul 2 07:56:08.216686 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jul 2 07:56:08.216707 kernel: PCI: CLS 0 bytes, default 64 Jul 2 07:56:08.216721 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jul 2 07:56:08.216736 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Jul 2 07:56:08.216753 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jul 2 07:56:08.216770 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Jul 2 07:56:08.216786 kernel: clocksource: Switched to clocksource tsc Jul 2 07:56:08.216817 kernel: Initialise system trusted keyrings Jul 2 07:56:08.216834 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Jul 2 07:56:08.216851 kernel: Key type asymmetric registered Jul 2 07:56:08.216868 kernel: Asymmetric key parser 'x509' registered Jul 2 07:56:08.216885 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 07:56:08.216903 kernel: io scheduler mq-deadline registered Jul 2 07:56:08.216921 kernel: io scheduler kyber registered Jul 2 07:56:08.216938 kernel: io scheduler bfq registered Jul 2 07:56:08.216963 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 07:56:08.216987 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Jul 2 07:56:08.217165 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Jul 2 07:56:08.217190 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Jul 2 07:56:08.217366 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Jul 2 07:56:08.217390 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Jul 2 07:56:08.217570 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Jul 2 07:56:08.217593 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 07:56:08.217612 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 07:56:08.217630 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Jul 2 07:56:08.217653 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Jul 2 07:56:08.217669 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Jul 2 07:56:08.217848 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Jul 2 07:56:08.217875 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 2 07:56:08.217894 kernel: i8042: Warning: Keylock active Jul 2 07:56:08.217912 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 2 07:56:08.217930 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 2 07:56:08.218116 kernel: rtc_cmos 00:00: RTC can wake from S4 Jul 2 07:56:08.218276 kernel: rtc_cmos 00:00: registered as rtc0 Jul 2 07:56:08.223303 kernel: rtc_cmos 00:00: setting system clock to 2024-07-02T07:56:07 UTC (1719906967) Jul 2 07:56:08.223942 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Jul 2 07:56:08.223983 kernel: intel_pstate: CPU model not supported Jul 2 07:56:08.224002 kernel: pstore: Registered efi as persistent store backend Jul 2 07:56:08.224020 kernel: NET: Registered PF_INET6 protocol family Jul 2 07:56:08.224038 kernel: Segment Routing with IPv6 Jul 2 07:56:08.224058 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 07:56:08.224086 kernel: NET: Registered PF_PACKET protocol family Jul 2 07:56:08.224104 kernel: Key type dns_resolver registered Jul 2 07:56:08.224122 kernel: IPI shorthand broadcast: enabled Jul 2 07:56:08.224141 kernel: sched_clock: Marking stable (736076901, 147868461)->(960902693, -76957331) Jul 2 07:56:08.224159 kernel: registered taskstats version 1 Jul 2 07:56:08.224178 kernel: Loading compiled-in X.509 certificates Jul 2 07:56:08.224203 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 2 07:56:08.224223 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 07:56:08.224240 kernel: Key type .fscrypt registered Jul 2 07:56:08.224263 kernel: Key type fscrypt-provisioning registered Jul 2 07:56:08.224280 kernel: pstore: Using crash dump compression: deflate Jul 2 07:56:08.224297 kernel: ima: Allocated hash algorithm: sha1 Jul 2 07:56:08.224315 kernel: ima: No architecture policies found Jul 2 07:56:08.224333 kernel: clk: Disabling unused clocks Jul 2 07:56:08.224351 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 07:56:08.224369 kernel: Write protecting the kernel read-only data: 28672k Jul 2 07:56:08.224387 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 07:56:08.224410 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 07:56:08.224449 kernel: Run /init as init process Jul 2 07:56:08.224468 kernel: with arguments: Jul 2 07:56:08.224486 kernel: /init Jul 2 07:56:08.224504 kernel: with environment: Jul 2 07:56:08.224521 kernel: HOME=/ Jul 2 07:56:08.224539 kernel: TERM=linux Jul 2 07:56:08.224558 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 07:56:08.224581 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:56:08.224607 systemd[1]: Detected virtualization kvm. Jul 2 07:56:08.224627 systemd[1]: Detected architecture x86-64. Jul 2 07:56:08.224645 systemd[1]: Running in initrd. Jul 2 07:56:08.224664 systemd[1]: No hostname configured, using default hostname. Jul 2 07:56:08.224682 systemd[1]: Hostname set to . Jul 2 07:56:08.224702 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:56:08.224720 systemd[1]: Queued start job for default target initrd.target. Jul 2 07:56:08.224744 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:56:08.224763 systemd[1]: Reached target cryptsetup.target. Jul 2 07:56:08.224781 systemd[1]: Reached target paths.target. Jul 2 07:56:08.224800 systemd[1]: Reached target slices.target. Jul 2 07:56:08.224819 systemd[1]: Reached target swap.target. Jul 2 07:56:08.224837 systemd[1]: Reached target timers.target. Jul 2 07:56:08.224857 systemd[1]: Listening on iscsid.socket. Jul 2 07:56:08.224875 systemd[1]: Listening on iscsiuio.socket. Jul 2 07:56:08.224898 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 07:56:08.224917 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 07:56:08.224936 systemd[1]: Listening on systemd-journald.socket. Jul 2 07:56:08.224954 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:56:08.224973 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:56:08.224992 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:56:08.225011 systemd[1]: Reached target sockets.target. Jul 2 07:56:08.225030 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:56:08.225053 systemd[1]: Finished network-cleanup.service. Jul 2 07:56:08.225073 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 07:56:08.225092 systemd[1]: Starting systemd-journald.service... Jul 2 07:56:08.225134 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:56:08.225158 systemd[1]: Starting systemd-resolved.service... Jul 2 07:56:08.225178 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 07:56:08.225204 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:56:08.225229 kernel: audit: type=1130 audit(1719906968.202:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.225249 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 07:56:08.225269 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 07:56:08.225289 kernel: audit: type=1130 audit(1719906968.217:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.225318 systemd-journald[190]: Journal started Jul 2 07:56:08.225422 systemd-journald[190]: Runtime Journal (/run/log/journal/25ade85fdf70e90ff370a01f00d79223) is 8.0M, max 148.8M, 140.8M free. Jul 2 07:56:08.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.227997 systemd-modules-load[191]: Inserted module 'overlay' Jul 2 07:56:08.247209 systemd[1]: Started systemd-journald.service. Jul 2 07:56:08.247260 kernel: audit: type=1130 audit(1719906968.224:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.247307 kernel: audit: type=1130 audit(1719906968.237:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.245507 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 07:56:08.257144 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:56:08.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.281075 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:56:08.287522 kernel: audit: type=1130 audit(1719906968.279:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.288532 systemd-resolved[192]: Positive Trust Anchors: Jul 2 07:56:08.288559 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:56:08.288613 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:56:08.294068 systemd-resolved[192]: Defaulting to hostname 'linux'. Jul 2 07:56:08.299248 systemd[1]: Started systemd-resolved.service. Jul 2 07:56:08.299518 systemd[1]: Reached target nss-lookup.target. Jul 2 07:56:08.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.303460 kernel: audit: type=1130 audit(1719906968.297:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.313049 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 07:56:08.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.322011 systemd[1]: Starting dracut-cmdline.service... Jul 2 07:56:08.327601 kernel: audit: type=1130 audit(1719906968.315:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.327647 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 07:56:08.334457 kernel: Bridge firewalling registered Jul 2 07:56:08.334456 systemd-modules-load[191]: Inserted module 'br_netfilter' Jul 2 07:56:08.339276 dracut-cmdline[205]: dracut-dracut-053 Jul 2 07:56:08.344288 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:56:08.366261 kernel: SCSI subsystem initialized Jul 2 07:56:08.384241 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 07:56:08.384342 kernel: device-mapper: uevent: version 1.0.3 Jul 2 07:56:08.389526 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 07:56:08.391093 systemd-modules-load[191]: Inserted module 'dm_multipath' Jul 2 07:56:08.393105 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:56:08.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.407265 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:56:08.409004 kernel: audit: type=1130 audit(1719906968.402:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.423110 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:56:08.434649 kernel: audit: type=1130 audit(1719906968.426:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.451477 kernel: Loading iSCSI transport class v2.0-870. Jul 2 07:56:08.472481 kernel: iscsi: registered transport (tcp) Jul 2 07:56:08.500875 kernel: iscsi: registered transport (qla4xxx) Jul 2 07:56:08.500986 kernel: QLogic iSCSI HBA Driver Jul 2 07:56:08.548557 systemd[1]: Finished dracut-cmdline.service. Jul 2 07:56:08.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.550407 systemd[1]: Starting dracut-pre-udev.service... Jul 2 07:56:08.608505 kernel: raid6: avx2x4 gen() 18634 MB/s Jul 2 07:56:08.625481 kernel: raid6: avx2x4 xor() 7810 MB/s Jul 2 07:56:08.642500 kernel: raid6: avx2x2 gen() 18588 MB/s Jul 2 07:56:08.659508 kernel: raid6: avx2x2 xor() 18363 MB/s Jul 2 07:56:08.676477 kernel: raid6: avx2x1 gen() 14515 MB/s Jul 2 07:56:08.693507 kernel: raid6: avx2x1 xor() 15780 MB/s Jul 2 07:56:08.710509 kernel: raid6: sse2x4 gen() 11027 MB/s Jul 2 07:56:08.727483 kernel: raid6: sse2x4 xor() 6609 MB/s Jul 2 07:56:08.744475 kernel: raid6: sse2x2 gen() 12001 MB/s Jul 2 07:56:08.761475 kernel: raid6: sse2x2 xor() 7464 MB/s Jul 2 07:56:08.778485 kernel: raid6: sse2x1 gen() 10362 MB/s Jul 2 07:56:08.796736 kernel: raid6: sse2x1 xor() 5187 MB/s Jul 2 07:56:08.796802 kernel: raid6: using algorithm avx2x4 gen() 18634 MB/s Jul 2 07:56:08.796835 kernel: raid6: .... xor() 7810 MB/s, rmw enabled Jul 2 07:56:08.797751 kernel: raid6: using avx2x2 recovery algorithm Jul 2 07:56:08.813465 kernel: xor: automatically using best checksumming function avx Jul 2 07:56:08.920469 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 07:56:08.932276 systemd[1]: Finished dracut-pre-udev.service. Jul 2 07:56:08.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.932000 audit: BPF prog-id=7 op=LOAD Jul 2 07:56:08.932000 audit: BPF prog-id=8 op=LOAD Jul 2 07:56:08.934746 systemd[1]: Starting systemd-udevd.service... Jul 2 07:56:08.952377 systemd-udevd[388]: Using default interface naming scheme 'v252'. Jul 2 07:56:08.959437 systemd[1]: Started systemd-udevd.service. Jul 2 07:56:08.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:08.964371 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 07:56:08.987309 dracut-pre-trigger[399]: rd.md=0: removing MD RAID activation Jul 2 07:56:09.027387 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 07:56:09.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:09.028814 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:56:09.096341 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:56:09.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:09.165450 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 07:56:09.186461 kernel: scsi host0: Virtio SCSI HBA Jul 2 07:56:09.211466 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Jul 2 07:56:09.258469 kernel: AVX2 version of gcm_enc/dec engaged. Jul 2 07:56:09.260455 kernel: AES CTR mode by8 optimization enabled Jul 2 07:56:09.319118 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Jul 2 07:56:09.319453 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Jul 2 07:56:09.319652 kernel: sd 0:0:1:0: [sda] Write Protect is off Jul 2 07:56:09.319996 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Jul 2 07:56:09.320243 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Jul 2 07:56:09.330390 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 07:56:09.330478 kernel: GPT:17805311 != 25165823 Jul 2 07:56:09.330501 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 07:56:09.330533 kernel: GPT:17805311 != 25165823 Jul 2 07:56:09.331035 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 07:56:09.332480 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:56:09.338487 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Jul 2 07:56:09.400455 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (438) Jul 2 07:56:09.412073 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 07:56:09.434612 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 07:56:09.444639 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 07:56:09.467682 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 07:56:09.490695 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:56:09.505265 systemd[1]: Starting disk-uuid.service... Jul 2 07:56:09.534127 disk-uuid[516]: Primary Header is updated. Jul 2 07:56:09.534127 disk-uuid[516]: Secondary Entries is updated. Jul 2 07:56:09.534127 disk-uuid[516]: Secondary Header is updated. Jul 2 07:56:09.555561 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:56:10.565310 disk-uuid[517]: The operation has completed successfully. Jul 2 07:56:10.573557 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 07:56:10.629872 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 07:56:10.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:10.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:10.630009 systemd[1]: Finished disk-uuid.service. Jul 2 07:56:10.645556 systemd[1]: Starting verity-setup.service... Jul 2 07:56:10.674607 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jul 2 07:56:10.750326 systemd[1]: Found device dev-mapper-usr.device. Jul 2 07:56:10.760881 systemd[1]: Mounting sysusr-usr.mount... Jul 2 07:56:10.772809 systemd[1]: Finished verity-setup.service. Jul 2 07:56:10.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:10.861482 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:56:10.861544 systemd[1]: Mounted sysusr-usr.mount. Jul 2 07:56:10.861906 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 07:56:10.862803 systemd[1]: Starting ignition-setup.service... Jul 2 07:56:10.934594 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:56:10.934632 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:56:10.934656 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:56:10.934679 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 07:56:10.918633 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 07:56:10.931105 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 07:56:10.952043 systemd[1]: Finished ignition-setup.service. Jul 2 07:56:10.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:10.954720 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 07:56:11.035304 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 07:56:11.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.043000 audit: BPF prog-id=9 op=LOAD Jul 2 07:56:11.045625 systemd[1]: Starting systemd-networkd.service... Jul 2 07:56:11.081885 systemd-networkd[692]: lo: Link UP Jul 2 07:56:11.081897 systemd-networkd[692]: lo: Gained carrier Jul 2 07:56:11.083136 systemd-networkd[692]: Enumeration completed Jul 2 07:56:11.083332 systemd[1]: Started systemd-networkd.service. Jul 2 07:56:11.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.083657 systemd-networkd[692]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:56:11.085895 systemd-networkd[692]: eth0: Link UP Jul 2 07:56:11.085903 systemd-networkd[692]: eth0: Gained carrier Jul 2 07:56:11.097823 systemd-networkd[692]: eth0: DHCPv4 address 10.128.0.73/32, gateway 10.128.0.1 acquired from 169.254.169.254 Jul 2 07:56:11.104879 systemd[1]: Reached target network.target. Jul 2 07:56:11.127731 systemd[1]: Starting iscsiuio.service... Jul 2 07:56:11.185734 systemd[1]: Started iscsiuio.service. Jul 2 07:56:11.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.187115 systemd[1]: Starting iscsid.service... Jul 2 07:56:11.198935 iscsid[701]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:56:11.198935 iscsid[701]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 07:56:11.198935 iscsid[701]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 07:56:11.198935 iscsid[701]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 07:56:11.198935 iscsid[701]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 07:56:11.198935 iscsid[701]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:56:11.198935 iscsid[701]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 07:56:11.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.233630 ignition[610]: Ignition 2.14.0 Jul 2 07:56:11.209696 systemd[1]: Started iscsid.service. Jul 2 07:56:11.233646 ignition[610]: Stage: fetch-offline Jul 2 07:56:11.217793 systemd[1]: Starting dracut-initqueue.service... Jul 2 07:56:11.233730 ignition[610]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:56:11.235546 systemd[1]: Finished dracut-initqueue.service. Jul 2 07:56:11.233792 ignition[610]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:56:11.263015 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 07:56:11.256164 ignition[610]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:56:11.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.297834 systemd[1]: Reached target remote-fs-pre.target. Jul 2 07:56:11.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.256379 ignition[610]: parsed url from cmdline: "" Jul 2 07:56:11.314633 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:56:11.256387 ignition[610]: no config URL provided Jul 2 07:56:11.331645 systemd[1]: Reached target remote-fs.target. Jul 2 07:56:11.256396 ignition[610]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:56:11.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.350666 systemd[1]: Starting dracut-pre-mount.service... Jul 2 07:56:11.256406 ignition[610]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:56:11.367764 systemd[1]: Starting ignition-fetch.service... Jul 2 07:56:11.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.256414 ignition[610]: failed to fetch config: resource requires networking Jul 2 07:56:11.397490 unknown[716]: fetched base config from "system" Jul 2 07:56:11.256821 ignition[610]: Ignition finished successfully Jul 2 07:56:11.397504 unknown[716]: fetched base config from "system" Jul 2 07:56:11.378591 ignition[716]: Ignition 2.14.0 Jul 2 07:56:11.397516 unknown[716]: fetched user config from "gcp" Jul 2 07:56:11.378611 ignition[716]: Stage: fetch Jul 2 07:56:11.412090 systemd[1]: Finished dracut-pre-mount.service. Jul 2 07:56:11.378745 ignition[716]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:56:11.427870 systemd[1]: Finished ignition-fetch.service. Jul 2 07:56:11.378778 ignition[716]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:56:11.446960 systemd[1]: Starting ignition-kargs.service... Jul 2 07:56:11.386187 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:56:11.477051 systemd[1]: Finished ignition-kargs.service. Jul 2 07:56:11.386450 ignition[716]: parsed url from cmdline: "" Jul 2 07:56:11.484919 systemd[1]: Starting ignition-disks.service... Jul 2 07:56:11.386459 ignition[716]: no config URL provided Jul 2 07:56:11.509978 systemd[1]: Finished ignition-disks.service. Jul 2 07:56:11.386478 ignition[716]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:56:11.531849 systemd[1]: Reached target initrd-root-device.target. Jul 2 07:56:11.386491 ignition[716]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:56:11.546676 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:56:11.386533 ignition[716]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Jul 2 07:56:11.564600 systemd[1]: Reached target local-fs.target. Jul 2 07:56:11.393107 ignition[716]: GET result: OK Jul 2 07:56:11.577584 systemd[1]: Reached target sysinit.target. Jul 2 07:56:11.393222 ignition[716]: parsing config with SHA512: 6f2a0d16ba643caa7a2135207e8179e7b75ecaa145144ff1e276516cf753971db9944169f8e2d966634a0386ec5b42411f9eafd9cf5ca4209eaa45c38d1ebc53 Jul 2 07:56:11.590620 systemd[1]: Reached target basic.target. Jul 2 07:56:11.398650 ignition[716]: fetch: fetch complete Jul 2 07:56:11.604843 systemd[1]: Starting systemd-fsck-root.service... Jul 2 07:56:11.398667 ignition[716]: fetch: fetch passed Jul 2 07:56:11.398731 ignition[716]: Ignition finished successfully Jul 2 07:56:11.460075 ignition[722]: Ignition 2.14.0 Jul 2 07:56:11.460082 ignition[722]: Stage: kargs Jul 2 07:56:11.460204 ignition[722]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:56:11.460237 ignition[722]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:56:11.467395 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:56:11.468656 ignition[722]: kargs: kargs passed Jul 2 07:56:11.468703 ignition[722]: Ignition finished successfully Jul 2 07:56:11.496078 ignition[728]: Ignition 2.14.0 Jul 2 07:56:11.496088 ignition[728]: Stage: disks Jul 2 07:56:11.496222 ignition[728]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:56:11.496265 ignition[728]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:56:11.504822 ignition[728]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:56:11.506405 ignition[728]: disks: disks passed Jul 2 07:56:11.506474 ignition[728]: Ignition finished successfully Jul 2 07:56:11.650954 systemd-fsck[736]: ROOT: clean, 614/1628000 files, 124057/1617920 blocks Jul 2 07:56:11.836792 systemd[1]: Finished systemd-fsck-root.service. Jul 2 07:56:11.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:11.847267 systemd[1]: Mounting sysroot.mount... Jul 2 07:56:11.875669 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 07:56:11.874895 systemd[1]: Mounted sysroot.mount. Jul 2 07:56:11.883027 systemd[1]: Reached target initrd-root-fs.target. Jul 2 07:56:11.903830 systemd[1]: Mounting sysroot-usr.mount... Jul 2 07:56:11.921239 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 2 07:56:11.921340 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 07:56:11.921400 systemd[1]: Reached target ignition-diskful.target. Jul 2 07:56:11.942260 systemd[1]: Mounted sysroot-usr.mount. Jul 2 07:56:11.967589 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:56:12.019645 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (742) Jul 2 07:56:12.019692 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:56:12.019716 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:56:12.019739 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:56:12.012580 systemd[1]: Starting initrd-setup-root.service... Jul 2 07:56:12.040633 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 07:56:12.039866 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:56:12.049810 initrd-setup-root[763]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 07:56:12.067661 initrd-setup-root[773]: cut: /sysroot/etc/group: No such file or directory Jul 2 07:56:12.077669 initrd-setup-root[781]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 07:56:12.087586 initrd-setup-root[789]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 07:56:12.123395 systemd[1]: Finished initrd-setup-root.service. Jul 2 07:56:12.163760 kernel: kauditd_printk_skb: 23 callbacks suppressed Jul 2 07:56:12.163803 kernel: audit: type=1130 audit(1719906972.122:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:12.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:12.125235 systemd[1]: Starting ignition-mount.service... Jul 2 07:56:12.172156 systemd[1]: Starting sysroot-boot.service... Jul 2 07:56:12.186148 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 07:56:12.186441 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 07:56:12.210614 ignition[808]: INFO : Ignition 2.14.0 Jul 2 07:56:12.210614 ignition[808]: INFO : Stage: mount Jul 2 07:56:12.210614 ignition[808]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:56:12.210614 ignition[808]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:56:12.312674 kernel: audit: type=1130 audit(1719906972.225:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:12.312728 kernel: audit: type=1130 audit(1719906972.271:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:12.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:12.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:12.217890 systemd[1]: Finished sysroot-boot.service. Jul 2 07:56:12.327658 ignition[808]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:56:12.327658 ignition[808]: INFO : mount: mount passed Jul 2 07:56:12.327658 ignition[808]: INFO : Ignition finished successfully Jul 2 07:56:12.401644 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (818) Jul 2 07:56:12.401693 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:56:12.401726 kernel: BTRFS info (device sda6): using free space tree Jul 2 07:56:12.401759 kernel: BTRFS info (device sda6): has skinny extents Jul 2 07:56:12.401780 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 07:56:12.227279 systemd[1]: Finished ignition-mount.service. Jul 2 07:56:12.231725 systemd-networkd[692]: eth0: Gained IPv6LL Jul 2 07:56:12.274382 systemd[1]: Starting ignition-files.service... Jul 2 07:56:12.425644 ignition[837]: INFO : Ignition 2.14.0 Jul 2 07:56:12.425644 ignition[837]: INFO : Stage: files Jul 2 07:56:12.425644 ignition[837]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:56:12.425644 ignition[837]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:56:12.425644 ignition[837]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:56:12.425644 ignition[837]: DEBUG : files: compiled without relabeling support, skipping Jul 2 07:56:12.425644 ignition[837]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 07:56:12.425644 ignition[837]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 07:56:12.528687 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (837) Jul 2 07:56:12.324686 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:56:12.537649 ignition[837]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 07:56:12.537649 ignition[837]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 07:56:12.537649 ignition[837]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 07:56:12.537649 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Jul 2 07:56:12.537649 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:56:12.537649 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1876973019" Jul 2 07:56:12.537649 ignition[837]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1876973019": device or resource busy Jul 2 07:56:12.537649 ignition[837]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1876973019", trying btrfs: device or resource busy Jul 2 07:56:12.537649 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1876973019" Jul 2 07:56:12.537649 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1876973019" Jul 2 07:56:12.537649 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem1876973019" Jul 2 07:56:12.537649 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem1876973019" Jul 2 07:56:12.537649 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Jul 2 07:56:12.537649 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 07:56:12.537649 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Jul 2 07:56:12.386815 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:56:12.782669 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Jul 2 07:56:12.782669 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 07:56:12.782669 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Jul 2 07:56:12.782669 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(8): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:56:12.430273 unknown[837]: wrote ssh authorized keys file for user: core Jul 2 07:56:12.851689 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3801770857" Jul 2 07:56:12.851689 ignition[837]: CRITICAL : files: createFilesystemsFiles: createFiles: op(8): op(9): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3801770857": device or resource busy Jul 2 07:56:12.851689 ignition[837]: ERROR : files: createFilesystemsFiles: createFiles: op(8): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3801770857", trying btrfs: device or resource busy Jul 2 07:56:12.851689 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3801770857" Jul 2 07:56:12.851689 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3801770857" Jul 2 07:56:12.851689 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [started] unmounting "/mnt/oem3801770857" Jul 2 07:56:12.851689 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [finished] unmounting "/mnt/oem3801770857" Jul 2 07:56:12.851689 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Jul 2 07:56:12.851689 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/install.sh" Jul 2 07:56:12.851689 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 07:56:12.851689 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 2 07:56:12.851689 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 2 07:56:12.851689 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 07:56:12.851689 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 07:56:12.851689 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 07:56:13.100681 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 07:56:13.100681 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:56:13.100681 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:56:13.100681 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 07:56:13.100681 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 07:56:13.100681 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Jul 2 07:56:13.100681 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:56:13.100681 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4194133847" Jul 2 07:56:13.100681 ignition[837]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4194133847": device or resource busy Jul 2 07:56:13.100681 ignition[837]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4194133847", trying btrfs: device or resource busy Jul 2 07:56:13.100681 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4194133847" Jul 2 07:56:13.100681 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4194133847" Jul 2 07:56:13.100681 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem4194133847" Jul 2 07:56:13.100681 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem4194133847" Jul 2 07:56:13.356714 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Jul 2 07:56:13.356714 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Jul 2 07:56:13.356714 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(16): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 07:56:13.356714 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(17): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3833204614" Jul 2 07:56:13.356714 ignition[837]: CRITICAL : files: createFilesystemsFiles: createFiles: op(16): op(17): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3833204614": device or resource busy Jul 2 07:56:13.356714 ignition[837]: ERROR : files: createFilesystemsFiles: createFiles: op(16): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3833204614", trying btrfs: device or resource busy Jul 2 07:56:13.356714 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3833204614" Jul 2 07:56:13.356714 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3833204614" Jul 2 07:56:13.356714 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [started] unmounting "/mnt/oem3833204614" Jul 2 07:56:13.356714 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [finished] unmounting "/mnt/oem3833204614" Jul 2 07:56:13.356714 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Jul 2 07:56:13.356714 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 07:56:13.356714 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Jul 2 07:56:13.356714 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET result: OK Jul 2 07:56:13.591816 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(1b): [started] processing unit "oem-gce.service" Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(1b): [finished] processing unit "oem-gce.service" Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(1c): [started] processing unit "oem-gce-enable-oslogin.service" Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(1c): [finished] processing unit "oem-gce-enable-oslogin.service" Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(1d): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(1d): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(1e): [started] processing unit "prepare-helm.service" Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(1e): op(1f): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(1e): op(1f): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(1e): [finished] processing unit "prepare-helm.service" Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(20): [started] setting preset to enabled for "prepare-helm.service" Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-helm.service" Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(21): [started] setting preset to enabled for "oem-gce.service" Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(21): [finished] setting preset to enabled for "oem-gce.service" Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(22): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(22): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(23): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 07:56:13.591816 ignition[837]: INFO : files: op(23): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 07:56:13.591816 ignition[837]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:56:14.119621 kernel: audit: type=1130 audit(1719906973.607:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.119678 kernel: audit: type=1130 audit(1719906973.703:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.119702 kernel: audit: type=1130 audit(1719906973.737:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.119725 kernel: audit: type=1131 audit(1719906973.737:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.119754 kernel: audit: type=1130 audit(1719906973.858:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.119769 kernel: audit: type=1131 audit(1719906973.880:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.119783 kernel: audit: type=1130 audit(1719906973.980:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.577559 systemd[1]: Finished ignition-files.service. Jul 2 07:56:14.133623 ignition[837]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:56:14.133623 ignition[837]: INFO : files: files passed Jul 2 07:56:14.133623 ignition[837]: INFO : Ignition finished successfully Jul 2 07:56:13.619258 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 07:56:13.664852 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 07:56:14.226611 initrd-setup-root-after-ignition[860]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 07:56:13.666416 systemd[1]: Starting ignition-quench.service... Jul 2 07:56:13.682995 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 07:56:13.704983 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 07:56:13.705121 systemd[1]: Finished ignition-quench.service. Jul 2 07:56:13.738956 systemd[1]: Reached target ignition-complete.target. Jul 2 07:56:14.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.797944 systemd[1]: Starting initrd-parse-etc.service... Jul 2 07:56:13.836218 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 07:56:14.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.836330 systemd[1]: Finished initrd-parse-etc.service. Jul 2 07:56:14.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.881523 systemd[1]: Reached target initrd-fs.target. Jul 2 07:56:14.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.933758 systemd[1]: Reached target initrd.target. Jul 2 07:56:14.398604 ignition[875]: INFO : Ignition 2.14.0 Jul 2 07:56:14.398604 ignition[875]: INFO : Stage: umount Jul 2 07:56:14.398604 ignition[875]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:56:14.398604 ignition[875]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Jul 2 07:56:13.946852 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 07:56:14.468662 ignition[875]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Jul 2 07:56:14.468662 ignition[875]: INFO : umount: umount passed Jul 2 07:56:14.468662 ignition[875]: INFO : Ignition finished successfully Jul 2 07:56:14.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.948128 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 07:56:14.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.965027 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 07:56:14.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:13.983150 systemd[1]: Starting initrd-cleanup.service... Jul 2 07:56:14.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.028590 systemd[1]: Stopped target nss-lookup.target. Jul 2 07:56:14.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.037877 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 07:56:14.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.057991 systemd[1]: Stopped target timers.target. Jul 2 07:56:14.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.078915 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 07:56:14.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.079095 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 07:56:14.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.099104 systemd[1]: Stopped target initrd.target. Jul 2 07:56:14.126853 systemd[1]: Stopped target basic.target. Jul 2 07:56:14.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.133893 systemd[1]: Stopped target ignition-complete.target. Jul 2 07:56:14.154938 systemd[1]: Stopped target ignition-diskful.target. Jul 2 07:56:14.168924 systemd[1]: Stopped target initrd-root-device.target. Jul 2 07:56:14.191846 systemd[1]: Stopped target remote-fs.target. Jul 2 07:56:14.209762 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 07:56:14.234784 systemd[1]: Stopped target sysinit.target. Jul 2 07:56:14.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.257781 systemd[1]: Stopped target local-fs.target. Jul 2 07:56:14.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.272757 systemd[1]: Stopped target local-fs-pre.target. Jul 2 07:56:14.288740 systemd[1]: Stopped target swap.target. Jul 2 07:56:14.303715 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 07:56:14.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.303909 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 07:56:14.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.821000 audit: BPF prog-id=6 op=UNLOAD Jul 2 07:56:14.318912 systemd[1]: Stopped target cryptsetup.target. Jul 2 07:56:14.334715 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 07:56:14.334946 systemd[1]: Stopped dracut-initqueue.service. Jul 2 07:56:14.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.351871 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 07:56:14.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.352051 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 07:56:14.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.369871 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 07:56:14.370038 systemd[1]: Stopped ignition-files.service. Jul 2 07:56:14.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.386194 systemd[1]: Stopping ignition-mount.service... Jul 2 07:56:14.413019 systemd[1]: Stopping iscsiuio.service... Jul 2 07:56:14.437899 systemd[1]: Stopping sysroot-boot.service... Jul 2 07:56:14.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.468796 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 07:56:14.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.469025 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 07:56:15.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.497998 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 07:56:14.498172 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 07:56:14.519716 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 07:56:15.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.520941 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 07:56:15.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.521052 systemd[1]: Stopped iscsiuio.service. Jul 2 07:56:15.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.533458 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 07:56:15.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.533575 systemd[1]: Stopped ignition-mount.service. Jul 2 07:56:15.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:15.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:14.548215 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 07:56:14.548348 systemd[1]: Stopped sysroot-boot.service. Jul 2 07:56:14.563508 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 07:56:14.563615 systemd[1]: Finished initrd-cleanup.service. Jul 2 07:56:14.576842 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 07:56:14.576905 systemd[1]: Stopped ignition-disks.service. Jul 2 07:56:15.186610 systemd-journald[190]: Received SIGTERM from PID 1 (n/a). Jul 2 07:56:15.186678 iscsid[701]: iscsid shutting down. Jul 2 07:56:14.592751 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 07:56:14.592818 systemd[1]: Stopped ignition-kargs.service. Jul 2 07:56:14.607750 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 07:56:14.607816 systemd[1]: Stopped ignition-fetch.service. Jul 2 07:56:14.623782 systemd[1]: Stopped target network.target. Jul 2 07:56:14.638664 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 07:56:14.638764 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 07:56:14.653724 systemd[1]: Stopped target paths.target. Jul 2 07:56:14.667661 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 07:56:14.671536 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 07:56:14.683547 systemd[1]: Stopped target slices.target. Jul 2 07:56:14.697572 systemd[1]: Stopped target sockets.target. Jul 2 07:56:14.697755 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 07:56:14.697790 systemd[1]: Closed iscsid.socket. Jul 2 07:56:14.718653 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 07:56:14.718735 systemd[1]: Closed iscsiuio.socket. Jul 2 07:56:14.732609 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 07:56:14.732701 systemd[1]: Stopped ignition-setup.service. Jul 2 07:56:14.748685 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 07:56:14.748761 systemd[1]: Stopped initrd-setup-root.service. Jul 2 07:56:14.764950 systemd[1]: Stopping systemd-networkd.service... Jul 2 07:56:14.768510 systemd-networkd[692]: eth0: DHCPv6 lease lost Jul 2 07:56:14.778922 systemd[1]: Stopping systemd-resolved.service... Jul 2 07:56:14.786038 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 07:56:14.786160 systemd[1]: Stopped systemd-networkd.service. Jul 2 07:56:14.806215 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 07:56:14.806350 systemd[1]: Stopped systemd-resolved.service. Jul 2 07:56:14.823218 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 07:56:14.823263 systemd[1]: Closed systemd-networkd.socket. Jul 2 07:56:14.838603 systemd[1]: Stopping network-cleanup.service... Jul 2 07:56:14.844708 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 07:56:14.844774 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 07:56:14.858883 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 07:56:14.858944 systemd[1]: Stopped systemd-sysctl.service. Jul 2 07:56:14.880800 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 07:56:14.880863 systemd[1]: Stopped systemd-modules-load.service. Jul 2 07:56:14.898811 systemd[1]: Stopping systemd-udevd.service... Jul 2 07:56:14.915099 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 07:56:14.915829 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 07:56:14.915984 systemd[1]: Stopped systemd-udevd.service. Jul 2 07:56:14.931136 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 07:56:14.931267 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 07:56:14.944718 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 07:56:14.944766 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 07:56:14.959613 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 07:56:14.959690 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 07:56:14.974680 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 07:56:14.974745 systemd[1]: Stopped dracut-cmdline.service. Jul 2 07:56:14.989693 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 07:56:14.989764 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 07:56:15.008704 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 07:56:15.033716 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 2 07:56:15.033812 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 2 07:56:15.048847 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 07:56:15.048910 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 07:56:15.064755 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 07:56:15.064832 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 07:56:15.081987 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 2 07:56:15.082752 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 07:56:15.082868 systemd[1]: Stopped network-cleanup.service. Jul 2 07:56:15.095993 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 07:56:15.096106 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 07:56:15.111882 systemd[1]: Reached target initrd-switch-root.target. Jul 2 07:56:15.196000 audit: BPF prog-id=9 op=UNLOAD Jul 2 07:56:15.127655 systemd[1]: Starting initrd-switch-root.service... Jul 2 07:56:15.150761 systemd[1]: Switching root. Jul 2 07:56:15.197699 systemd-journald[190]: Journal stopped Jul 2 07:56:19.971963 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 07:56:19.972092 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 07:56:19.972127 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 07:56:19.972158 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 07:56:19.972183 kernel: SELinux: policy capability open_perms=1 Jul 2 07:56:19.972206 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 07:56:19.972231 kernel: SELinux: policy capability always_check_network=0 Jul 2 07:56:19.972255 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 07:56:19.972280 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 07:56:19.972324 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 07:56:19.972354 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 07:56:19.972381 systemd[1]: Successfully loaded SELinux policy in 111.211ms. Jul 2 07:56:19.972417 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.943ms. Jul 2 07:56:19.972475 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:56:19.972502 systemd[1]: Detected virtualization kvm. Jul 2 07:56:19.972527 systemd[1]: Detected architecture x86-64. Jul 2 07:56:19.972550 systemd[1]: Detected first boot. Jul 2 07:56:19.972571 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:56:19.972597 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 07:56:19.972621 systemd[1]: Populated /etc with preset unit settings. Jul 2 07:56:19.972645 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:56:19.972671 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:56:19.972694 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:56:19.972718 kernel: kauditd_printk_skb: 51 callbacks suppressed Jul 2 07:56:19.972738 kernel: audit: type=1334 audit(1719906979.077:88): prog-id=12 op=LOAD Jul 2 07:56:19.972761 kernel: audit: type=1334 audit(1719906979.077:89): prog-id=3 op=UNLOAD Jul 2 07:56:19.972783 kernel: audit: type=1334 audit(1719906979.083:90): prog-id=13 op=LOAD Jul 2 07:56:19.972805 kernel: audit: type=1334 audit(1719906979.090:91): prog-id=14 op=LOAD Jul 2 07:56:19.972827 kernel: audit: type=1334 audit(1719906979.090:92): prog-id=4 op=UNLOAD Jul 2 07:56:19.972849 kernel: audit: type=1334 audit(1719906979.090:93): prog-id=5 op=UNLOAD Jul 2 07:56:19.972869 kernel: audit: type=1334 audit(1719906979.097:94): prog-id=15 op=LOAD Jul 2 07:56:19.972891 kernel: audit: type=1334 audit(1719906979.097:95): prog-id=12 op=UNLOAD Jul 2 07:56:19.972912 kernel: audit: type=1334 audit(1719906979.104:96): prog-id=16 op=LOAD Jul 2 07:56:19.972936 kernel: audit: type=1334 audit(1719906979.111:97): prog-id=17 op=LOAD Jul 2 07:56:19.972958 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 07:56:19.973910 systemd[1]: Stopped iscsid.service. Jul 2 07:56:19.973947 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 07:56:19.973971 systemd[1]: Stopped initrd-switch-root.service. Jul 2 07:56:19.973994 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 07:56:19.974024 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 07:56:19.974049 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 07:56:19.974079 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 2 07:56:19.974102 systemd[1]: Created slice system-getty.slice. Jul 2 07:56:19.974127 systemd[1]: Created slice system-modprobe.slice. Jul 2 07:56:19.974151 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 07:56:19.974173 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 07:56:19.974197 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 07:56:19.974219 systemd[1]: Created slice user.slice. Jul 2 07:56:19.974242 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:56:19.974265 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 07:56:19.974292 systemd[1]: Set up automount boot.automount. Jul 2 07:56:19.974319 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 07:56:19.974341 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 07:56:19.974365 systemd[1]: Stopped target initrd-fs.target. Jul 2 07:56:19.974388 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 07:56:19.974411 systemd[1]: Reached target integritysetup.target. Jul 2 07:56:19.974448 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:56:19.974471 systemd[1]: Reached target remote-fs.target. Jul 2 07:56:19.974493 systemd[1]: Reached target slices.target. Jul 2 07:56:19.974519 systemd[1]: Reached target swap.target. Jul 2 07:56:19.974542 systemd[1]: Reached target torcx.target. Jul 2 07:56:19.974564 systemd[1]: Reached target veritysetup.target. Jul 2 07:56:19.974586 systemd[1]: Listening on systemd-coredump.socket. Jul 2 07:56:19.974608 systemd[1]: Listening on systemd-initctl.socket. Jul 2 07:56:19.974633 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:56:19.974655 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:56:19.974678 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:56:19.974701 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 07:56:19.974723 systemd[1]: Mounting dev-hugepages.mount... Jul 2 07:56:19.974808 systemd[1]: Mounting dev-mqueue.mount... Jul 2 07:56:19.974867 systemd[1]: Mounting media.mount... Jul 2 07:56:19.974894 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:56:19.974917 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 07:56:19.974940 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 07:56:19.974974 systemd[1]: Mounting tmp.mount... Jul 2 07:56:19.974997 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 07:56:19.975019 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:56:19.975051 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:56:19.975074 systemd[1]: Starting modprobe@configfs.service... Jul 2 07:56:19.975096 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:56:19.975119 systemd[1]: Starting modprobe@drm.service... Jul 2 07:56:19.975142 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:56:19.975165 systemd[1]: Starting modprobe@fuse.service... Jul 2 07:56:19.975187 systemd[1]: Starting modprobe@loop.service... Jul 2 07:56:19.975209 kernel: fuse: init (API version 7.34) Jul 2 07:56:19.975236 kernel: loop: module loaded Jul 2 07:56:19.975258 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 07:56:19.975285 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 07:56:19.975308 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 07:56:19.975331 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 07:56:19.975354 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 07:56:19.975377 systemd[1]: Stopped systemd-journald.service. Jul 2 07:56:19.975399 systemd[1]: Starting systemd-journald.service... Jul 2 07:56:19.975422 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:56:19.975483 systemd[1]: Starting systemd-network-generator.service... Jul 2 07:56:19.975511 systemd-journald[1000]: Journal started Jul 2 07:56:19.975606 systemd-journald[1000]: Runtime Journal (/run/log/journal/25ade85fdf70e90ff370a01f00d79223) is 8.0M, max 148.8M, 140.8M free. Jul 2 07:56:15.568000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 07:56:15.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:56:15.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:56:15.723000 audit: BPF prog-id=10 op=LOAD Jul 2 07:56:15.723000 audit: BPF prog-id=10 op=UNLOAD Jul 2 07:56:15.723000 audit: BPF prog-id=11 op=LOAD Jul 2 07:56:15.723000 audit: BPF prog-id=11 op=UNLOAD Jul 2 07:56:15.872000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 07:56:15.872000 audit[908]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:15.872000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:56:15.883000 audit[908]: AVC avc: denied { associate } for pid=908 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 07:56:15.883000 audit[908]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=891 pid=908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:15.883000 audit: CWD cwd="/" Jul 2 07:56:15.883000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:15.883000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:15.883000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 07:56:19.077000 audit: BPF prog-id=12 op=LOAD Jul 2 07:56:19.077000 audit: BPF prog-id=3 op=UNLOAD Jul 2 07:56:19.083000 audit: BPF prog-id=13 op=LOAD Jul 2 07:56:19.090000 audit: BPF prog-id=14 op=LOAD Jul 2 07:56:19.090000 audit: BPF prog-id=4 op=UNLOAD Jul 2 07:56:19.090000 audit: BPF prog-id=5 op=UNLOAD Jul 2 07:56:19.097000 audit: BPF prog-id=15 op=LOAD Jul 2 07:56:19.097000 audit: BPF prog-id=12 op=UNLOAD Jul 2 07:56:19.104000 audit: BPF prog-id=16 op=LOAD Jul 2 07:56:19.111000 audit: BPF prog-id=17 op=LOAD Jul 2 07:56:19.111000 audit: BPF prog-id=13 op=UNLOAD Jul 2 07:56:19.111000 audit: BPF prog-id=14 op=UNLOAD Jul 2 07:56:19.118000 audit: BPF prog-id=18 op=LOAD Jul 2 07:56:19.118000 audit: BPF prog-id=15 op=UNLOAD Jul 2 07:56:19.146000 audit: BPF prog-id=19 op=LOAD Jul 2 07:56:19.153000 audit: BPF prog-id=20 op=LOAD Jul 2 07:56:19.153000 audit: BPF prog-id=16 op=UNLOAD Jul 2 07:56:19.153000 audit: BPF prog-id=17 op=UNLOAD Jul 2 07:56:19.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:19.167000 audit: BPF prog-id=18 op=UNLOAD Jul 2 07:56:19.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:19.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:19.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:19.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:19.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:19.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:19.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:19.933000 audit: BPF prog-id=21 op=LOAD Jul 2 07:56:19.933000 audit: BPF prog-id=22 op=LOAD Jul 2 07:56:19.933000 audit: BPF prog-id=23 op=LOAD Jul 2 07:56:19.933000 audit: BPF prog-id=19 op=UNLOAD Jul 2 07:56:19.933000 audit: BPF prog-id=20 op=UNLOAD Jul 2 07:56:19.968000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 07:56:19.968000 audit[1000]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffddd2dc8c0 a2=4000 a3=7ffddd2dc95c items=0 ppid=1 pid=1000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:19.968000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 07:56:19.076593 systemd[1]: Queued start job for default target multi-user.target. Jul 2 07:56:15.867709 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:56:19.155748 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 07:56:15.868622 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:15Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:56:15.868647 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:15Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:56:15.868688 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:15Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 07:56:15.868701 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:15Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 07:56:15.868740 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:15Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 07:56:15.868756 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:15Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 07:56:15.868988 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:15Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 07:56:15.869039 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:15Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 07:56:15.869056 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:15Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 07:56:15.872122 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:15Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 07:56:15.872194 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:15Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 07:56:15.872232 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:15Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 07:56:15.872260 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:15Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 07:56:15.872294 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:15Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 07:56:15.872320 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:15Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 07:56:18.459626 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:18Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:56:18.460294 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:18Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:56:18.460517 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:18Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:56:18.460756 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:18Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 07:56:18.460816 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:18Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 07:56:18.460899 /usr/lib/systemd/system-generators/torcx-generator[908]: time="2024-07-02T07:56:18Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 07:56:19.994472 systemd[1]: Starting systemd-remount-fs.service... Jul 2 07:56:20.009471 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:56:20.023470 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 07:56:20.029484 systemd[1]: Stopped verity-setup.service. Jul 2 07:56:20.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.049455 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:56:20.058452 systemd[1]: Started systemd-journald.service. Jul 2 07:56:20.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.067967 systemd[1]: Mounted dev-hugepages.mount. Jul 2 07:56:20.074797 systemd[1]: Mounted dev-mqueue.mount. Jul 2 07:56:20.081771 systemd[1]: Mounted media.mount. Jul 2 07:56:20.088879 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 07:56:20.098805 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 07:56:20.107892 systemd[1]: Mounted tmp.mount. Jul 2 07:56:20.115965 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 07:56:20.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.125073 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:56:20.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.134042 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 07:56:20.134257 systemd[1]: Finished modprobe@configfs.service. Jul 2 07:56:20.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.143089 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:56:20.143307 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:56:20.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.152088 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:56:20.152309 systemd[1]: Finished modprobe@drm.service. Jul 2 07:56:20.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.161077 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:56:20.161300 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:56:20.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.170101 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 07:56:20.170319 systemd[1]: Finished modprobe@fuse.service. Jul 2 07:56:20.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.179100 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:56:20.179322 systemd[1]: Finished modprobe@loop.service. Jul 2 07:56:20.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.188113 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:56:20.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.197058 systemd[1]: Finished systemd-network-generator.service. Jul 2 07:56:20.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.206063 systemd[1]: Finished systemd-remount-fs.service. Jul 2 07:56:20.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.215070 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:56:20.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.224423 systemd[1]: Reached target network-pre.target. Jul 2 07:56:20.234170 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 07:56:20.244237 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 07:56:20.252626 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 07:56:20.255801 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 07:56:20.266010 systemd[1]: Starting systemd-journal-flush.service... Jul 2 07:56:20.274642 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:56:20.276537 systemd[1]: Starting systemd-random-seed.service... Jul 2 07:56:20.283606 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:56:20.285294 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:56:20.294245 systemd[1]: Starting systemd-sysusers.service... Jul 2 07:56:20.297113 systemd-journald[1000]: Time spent on flushing to /var/log/journal/25ade85fdf70e90ff370a01f00d79223 is 59.771ms for 1159 entries. Jul 2 07:56:20.297113 systemd-journald[1000]: System Journal (/var/log/journal/25ade85fdf70e90ff370a01f00d79223) is 8.0M, max 584.8M, 576.8M free. Jul 2 07:56:20.396405 systemd-journald[1000]: Received client request to flush runtime journal. Jul 2 07:56:20.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.311635 systemd[1]: Starting systemd-udev-settle.service... Jul 2 07:56:20.397995 udevadm[1015]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 2 07:56:20.322043 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 07:56:20.332123 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 07:56:20.339053 systemd[1]: Finished systemd-random-seed.service. Jul 2 07:56:20.348009 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:56:20.360969 systemd[1]: Reached target first-boot-complete.target. Jul 2 07:56:20.373377 systemd[1]: Finished systemd-sysusers.service. Jul 2 07:56:20.384568 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:56:20.398478 systemd[1]: Finished systemd-journal-flush.service. Jul 2 07:56:20.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:20.454489 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:56:20.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:21.005237 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 07:56:21.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:21.012000 audit: BPF prog-id=24 op=LOAD Jul 2 07:56:21.013000 audit: BPF prog-id=25 op=LOAD Jul 2 07:56:21.013000 audit: BPF prog-id=7 op=UNLOAD Jul 2 07:56:21.013000 audit: BPF prog-id=8 op=UNLOAD Jul 2 07:56:21.015406 systemd[1]: Starting systemd-udevd.service... Jul 2 07:56:21.039068 systemd-udevd[1019]: Using default interface naming scheme 'v252'. Jul 2 07:56:21.093871 systemd[1]: Started systemd-udevd.service. Jul 2 07:56:21.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:21.104000 audit: BPF prog-id=26 op=LOAD Jul 2 07:56:21.106703 systemd[1]: Starting systemd-networkd.service... Jul 2 07:56:21.120000 audit: BPF prog-id=27 op=LOAD Jul 2 07:56:21.120000 audit: BPF prog-id=28 op=LOAD Jul 2 07:56:21.120000 audit: BPF prog-id=29 op=LOAD Jul 2 07:56:21.123494 systemd[1]: Starting systemd-userdbd.service... Jul 2 07:56:21.169522 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 2 07:56:21.196964 systemd[1]: Started systemd-userdbd.service. Jul 2 07:56:21.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:21.285468 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 2 07:56:21.301484 kernel: ACPI: button: Power Button [PWRF] Jul 2 07:56:21.318460 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Jul 2 07:56:21.337814 kernel: ACPI: button: Sleep Button [SLPF] Jul 2 07:56:21.347998 systemd-networkd[1034]: lo: Link UP Jul 2 07:56:21.348011 systemd-networkd[1034]: lo: Gained carrier Jul 2 07:56:21.348749 systemd-networkd[1034]: Enumeration completed Jul 2 07:56:21.348901 systemd[1]: Started systemd-networkd.service. Jul 2 07:56:21.350121 systemd-networkd[1034]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:56:21.352110 systemd-networkd[1034]: eth0: Link UP Jul 2 07:56:21.352263 systemd-networkd[1034]: eth0: Gained carrier Jul 2 07:56:21.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:21.363602 systemd-networkd[1034]: eth0: DHCPv4 address 10.128.0.73/32, gateway 10.128.0.1 acquired from 169.254.169.254 Jul 2 07:56:21.354000 audit[1023]: AVC avc: denied { confidentiality } for pid=1023 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:56:21.354000 audit[1023]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ce38c2bff0 a1=3207c a2=7f0800756bc5 a3=5 items=108 ppid=1019 pid=1023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:21.354000 audit: CWD cwd="/" Jul 2 07:56:21.354000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=1 name=(null) inode=14256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=2 name=(null) inode=14256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=3 name=(null) inode=14257 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=4 name=(null) inode=14256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=5 name=(null) inode=14258 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=6 name=(null) inode=14256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=7 name=(null) inode=14259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=8 name=(null) inode=14259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=9 name=(null) inode=14260 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=10 name=(null) inode=14259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=11 name=(null) inode=14261 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=12 name=(null) inode=14259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=13 name=(null) inode=14262 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=14 name=(null) inode=14259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=15 name=(null) inode=14263 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=16 name=(null) inode=14259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=17 name=(null) inode=14264 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=18 name=(null) inode=14256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=19 name=(null) inode=14265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=20 name=(null) inode=14265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=21 name=(null) inode=14266 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=22 name=(null) inode=14265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=23 name=(null) inode=14267 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=24 name=(null) inode=14265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=25 name=(null) inode=14268 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=26 name=(null) inode=14265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=27 name=(null) inode=14269 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=28 name=(null) inode=14265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=29 name=(null) inode=14270 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=30 name=(null) inode=14256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=31 name=(null) inode=14271 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=32 name=(null) inode=14271 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=33 name=(null) inode=14272 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=34 name=(null) inode=14271 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=35 name=(null) inode=14273 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=36 name=(null) inode=14271 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=37 name=(null) inode=14274 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=38 name=(null) inode=14271 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=39 name=(null) inode=14275 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=40 name=(null) inode=14271 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=41 name=(null) inode=14276 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=42 name=(null) inode=14256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=43 name=(null) inode=14277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=44 name=(null) inode=14277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=45 name=(null) inode=14278 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=46 name=(null) inode=14277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=47 name=(null) inode=14279 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=48 name=(null) inode=14277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=49 name=(null) inode=14280 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=50 name=(null) inode=14277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=51 name=(null) inode=14281 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=52 name=(null) inode=14277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=53 name=(null) inode=14282 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=55 name=(null) inode=14283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=56 name=(null) inode=14283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=57 name=(null) inode=14284 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=58 name=(null) inode=14283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=59 name=(null) inode=14285 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=60 name=(null) inode=14283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=61 name=(null) inode=14286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=62 name=(null) inode=14286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=63 name=(null) inode=14287 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=64 name=(null) inode=14286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=65 name=(null) inode=14288 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=66 name=(null) inode=14286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=67 name=(null) inode=14289 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=68 name=(null) inode=14286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=69 name=(null) inode=14290 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=70 name=(null) inode=14286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=71 name=(null) inode=14291 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=72 name=(null) inode=14283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=73 name=(null) inode=14292 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=74 name=(null) inode=14292 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=75 name=(null) inode=14293 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=76 name=(null) inode=14292 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=77 name=(null) inode=14294 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=78 name=(null) inode=14292 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=79 name=(null) inode=14295 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=80 name=(null) inode=14292 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=81 name=(null) inode=14296 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=82 name=(null) inode=14292 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=83 name=(null) inode=14297 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=84 name=(null) inode=14283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=85 name=(null) inode=14298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=86 name=(null) inode=14298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=87 name=(null) inode=14299 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=88 name=(null) inode=14298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=89 name=(null) inode=14300 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=90 name=(null) inode=14298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=91 name=(null) inode=14301 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=92 name=(null) inode=14298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=93 name=(null) inode=14302 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=94 name=(null) inode=14298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=95 name=(null) inode=14303 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=96 name=(null) inode=14283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=97 name=(null) inode=14304 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=98 name=(null) inode=14304 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=99 name=(null) inode=14305 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=100 name=(null) inode=14304 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=101 name=(null) inode=14306 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=102 name=(null) inode=14304 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=103 name=(null) inode=14307 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=104 name=(null) inode=14304 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=105 name=(null) inode=14308 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=106 name=(null) inode=14304 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PATH item=107 name=(null) inode=14309 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:21.354000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 07:56:21.413909 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Jul 2 07:56:21.414280 kernel: EDAC MC: Ver: 3.0.0 Jul 2 07:56:21.454506 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1021) Jul 2 07:56:21.487484 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Jul 2 07:56:21.496455 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 07:56:21.500340 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:56:21.517952 systemd[1]: Finished systemd-udev-settle.service. Jul 2 07:56:21.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:21.528169 systemd[1]: Starting lvm2-activation-early.service... Jul 2 07:56:21.559026 lvm[1056]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:56:21.592827 systemd[1]: Finished lvm2-activation-early.service. Jul 2 07:56:21.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:21.601813 systemd[1]: Reached target cryptsetup.target. Jul 2 07:56:21.612086 systemd[1]: Starting lvm2-activation.service... Jul 2 07:56:21.618051 lvm[1057]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:56:21.645818 systemd[1]: Finished lvm2-activation.service. Jul 2 07:56:21.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:21.654794 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:56:21.663585 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 07:56:21.663642 systemd[1]: Reached target local-fs.target. Jul 2 07:56:21.671601 systemd[1]: Reached target machines.target. Jul 2 07:56:21.682150 systemd[1]: Starting ldconfig.service... Jul 2 07:56:21.693668 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:56:21.693782 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:56:21.695464 systemd[1]: Starting systemd-boot-update.service... Jul 2 07:56:21.704220 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 07:56:21.716523 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 07:56:21.718755 systemd[1]: Starting systemd-sysext.service... Jul 2 07:56:21.719663 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1059 (bootctl) Jul 2 07:56:21.722918 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 07:56:21.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:21.743519 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 07:56:21.753886 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 07:56:21.762795 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:56:21.763120 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 07:56:21.793468 kernel: loop0: detected capacity change from 0 to 210664 Jul 2 07:56:21.872469 systemd-fsck[1069]: fsck.fat 4.2 (2021-01-31) Jul 2 07:56:21.872469 systemd-fsck[1069]: /dev/sda1: 789 files, 119238/258078 clusters Jul 2 07:56:21.876392 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 07:56:21.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:21.888775 systemd[1]: Mounting boot.mount... Jul 2 07:56:21.918602 systemd[1]: Mounted boot.mount. Jul 2 07:56:21.945032 systemd[1]: Finished systemd-boot-update.service. Jul 2 07:56:21.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:22.173796 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 07:56:22.174732 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 07:56:22.185551 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 07:56:22.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:22.212459 kernel: loop1: detected capacity change from 0 to 210664 Jul 2 07:56:22.240415 (sd-sysext)[1075]: Using extensions 'kubernetes'. Jul 2 07:56:22.241131 (sd-sysext)[1075]: Merged extensions into '/usr'. Jul 2 07:56:22.266423 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:56:22.268957 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:56:22.275936 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:56:22.277852 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:56:22.287601 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:56:22.296552 systemd[1]: Starting modprobe@loop.service... Jul 2 07:56:22.303708 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:56:22.303946 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:56:22.304144 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:56:22.309144 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:56:22.317108 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:56:22.317311 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:56:22.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:22.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:22.326362 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:56:22.326598 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:56:22.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:22.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:22.335240 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:56:22.335450 systemd[1]: Finished modprobe@loop.service. Jul 2 07:56:22.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:22.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:22.344301 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:56:22.344511 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:56:22.345958 systemd[1]: Finished systemd-sysext.service. Jul 2 07:56:22.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:22.356341 systemd[1]: Starting ensure-sysext.service... Jul 2 07:56:22.366032 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 07:56:22.373562 ldconfig[1058]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 07:56:22.378403 systemd[1]: Reloading. Jul 2 07:56:22.389398 systemd-tmpfiles[1082]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 07:56:22.392053 systemd-tmpfiles[1082]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 07:56:22.396087 systemd-tmpfiles[1082]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 07:56:22.471594 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-07-02T07:56:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:56:22.479593 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-07-02T07:56:22Z" level=info msg="torcx already run" Jul 2 07:56:22.634417 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:56:22.634472 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:56:22.673457 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:56:22.750000 audit: BPF prog-id=30 op=LOAD Jul 2 07:56:22.750000 audit: BPF prog-id=31 op=LOAD Jul 2 07:56:22.750000 audit: BPF prog-id=24 op=UNLOAD Jul 2 07:56:22.750000 audit: BPF prog-id=25 op=UNLOAD Jul 2 07:56:22.751000 audit: BPF prog-id=32 op=LOAD Jul 2 07:56:22.751000 audit: BPF prog-id=27 op=UNLOAD Jul 2 07:56:22.751000 audit: BPF prog-id=33 op=LOAD Jul 2 07:56:22.751000 audit: BPF prog-id=34 op=LOAD Jul 2 07:56:22.751000 audit: BPF prog-id=28 op=UNLOAD Jul 2 07:56:22.751000 audit: BPF prog-id=29 op=UNLOAD Jul 2 07:56:22.752000 audit: BPF prog-id=35 op=LOAD Jul 2 07:56:22.752000 audit: BPF prog-id=26 op=UNLOAD Jul 2 07:56:22.753000 audit: BPF prog-id=36 op=LOAD Jul 2 07:56:22.753000 audit: BPF prog-id=21 op=UNLOAD Jul 2 07:56:22.754000 audit: BPF prog-id=37 op=LOAD Jul 2 07:56:22.754000 audit: BPF prog-id=38 op=LOAD Jul 2 07:56:22.754000 audit: BPF prog-id=22 op=UNLOAD Jul 2 07:56:22.754000 audit: BPF prog-id=23 op=UNLOAD Jul 2 07:56:22.759909 systemd[1]: Finished ldconfig.service. Jul 2 07:56:22.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:22.770023 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 07:56:22.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:22.785528 systemd[1]: Starting audit-rules.service... Jul 2 07:56:22.794261 systemd[1]: Starting clean-ca-certificates.service... Jul 2 07:56:22.804680 systemd[1]: Starting oem-gce-enable-oslogin.service... Jul 2 07:56:22.815860 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 07:56:22.824000 audit: BPF prog-id=39 op=LOAD Jul 2 07:56:22.827337 systemd[1]: Starting systemd-resolved.service... Jul 2 07:56:22.834000 audit: BPF prog-id=40 op=LOAD Jul 2 07:56:22.837235 systemd[1]: Starting systemd-timesyncd.service... Jul 2 07:56:22.846555 systemd[1]: Starting systemd-update-utmp.service... Jul 2 07:56:22.855420 systemd[1]: Finished clean-ca-certificates.service. Jul 2 07:56:22.855000 audit[1173]: SYSTEM_BOOT pid=1173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 07:56:22.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:22.865199 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Jul 2 07:56:22.865363 systemd[1]: Finished oem-gce-enable-oslogin.service. Jul 2 07:56:22.868000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 07:56:22.868000 audit[1176]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdbe1b19d0 a2=420 a3=0 items=0 ppid=1146 pid=1176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:22.868000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 07:56:22.870496 augenrules[1176]: No rules Jul 2 07:56:22.875395 systemd[1]: Finished audit-rules.service. Jul 2 07:56:22.883058 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 07:56:22.898291 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:56:22.898876 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:56:22.903019 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:56:22.913705 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:56:22.922714 systemd[1]: Starting modprobe@loop.service... Jul 2 07:56:22.932015 systemd[1]: Starting oem-gce-enable-oslogin.service... Jul 2 07:56:22.937926 enable-oslogin[1184]: /etc/pam.d/sshd already exists. Not enabling OS Login Jul 2 07:56:22.940633 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:56:22.941009 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:56:22.943639 systemd[1]: Starting systemd-update-done.service... Jul 2 07:56:22.950913 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:56:22.951225 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:56:22.954724 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:56:22.954970 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:56:22.964559 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:56:22.964783 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:56:22.974466 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:56:22.974666 systemd[1]: Finished modprobe@loop.service. Jul 2 07:56:22.983543 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Jul 2 07:56:22.983810 systemd[1]: Finished oem-gce-enable-oslogin.service. Jul 2 07:56:22.984092 systemd-networkd[1034]: eth0: Gained IPv6LL Jul 2 07:56:22.993463 systemd[1]: Finished systemd-update-done.service. Jul 2 07:56:23.002669 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:56:23.002954 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:56:23.008311 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:56:23.009548 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:56:23.013343 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:56:23.022617 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:56:23.025788 systemd-resolved[1163]: Positive Trust Anchors: Jul 2 07:56:23.025811 systemd-resolved[1163]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:56:23.025875 systemd-resolved[1163]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:56:23.031674 systemd[1]: Starting modprobe@loop.service... Jul 2 07:56:23.041098 systemd[1]: Starting oem-gce-enable-oslogin.service... Jul 2 07:56:23.043123 systemd-resolved[1163]: Defaulting to hostname 'linux'. Jul 2 07:56:23.047123 enable-oslogin[1189]: /etc/pam.d/sshd already exists. Not enabling OS Login Jul 2 07:56:23.049663 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:56:23.049932 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:56:23.050128 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:56:23.050284 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:56:23.052707 systemd[1]: Started systemd-resolved.service. Jul 2 07:56:23.062384 systemd[1]: Finished systemd-update-utmp.service. Jul 2 07:56:23.071477 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:56:23.071735 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:56:23.081298 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:56:23.081553 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:56:23.090396 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:56:23.090648 systemd[1]: Finished modprobe@loop.service. Jul 2 07:56:23.091956 systemd-timesyncd[1170]: Contacted time server 169.254.169.254:123 (169.254.169.254). Jul 2 07:56:23.092044 systemd-timesyncd[1170]: Initial clock synchronization to Tue 2024-07-02 07:56:22.804157 UTC. Jul 2 07:56:23.099019 systemd[1]: Started systemd-timesyncd.service. Jul 2 07:56:23.108701 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Jul 2 07:56:23.108944 systemd[1]: Finished oem-gce-enable-oslogin.service. Jul 2 07:56:23.122764 systemd[1]: Reached target network.target. Jul 2 07:56:23.131851 systemd[1]: Reached target nss-lookup.target. Jul 2 07:56:23.141807 systemd[1]: Reached target time-set.target. Jul 2 07:56:23.150752 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:56:23.151197 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:56:23.153310 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:56:23.162450 systemd[1]: Starting modprobe@drm.service... Jul 2 07:56:23.171561 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:56:23.181410 systemd[1]: Starting modprobe@loop.service... Jul 2 07:56:23.190351 systemd[1]: Starting oem-gce-enable-oslogin.service... Jul 2 07:56:23.194550 enable-oslogin[1195]: /etc/pam.d/sshd already exists. Not enabling OS Login Jul 2 07:56:23.199730 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:56:23.199986 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:56:23.201969 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 07:56:23.210622 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:56:23.210845 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:56:23.213570 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:56:23.213811 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:56:23.224238 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:56:23.224478 systemd[1]: Finished modprobe@drm.service. Jul 2 07:56:23.234232 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:56:23.234471 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:56:23.244212 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:56:23.244455 systemd[1]: Finished modprobe@loop.service. Jul 2 07:56:23.254224 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Jul 2 07:56:23.254497 systemd[1]: Finished oem-gce-enable-oslogin.service. Jul 2 07:56:23.263253 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 07:56:23.274629 systemd[1]: Reached target network-online.target. Jul 2 07:56:23.282710 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:56:23.282780 systemd[1]: Reached target sysinit.target. Jul 2 07:56:23.291744 systemd[1]: Started motdgen.path. Jul 2 07:56:23.298673 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 07:56:23.308842 systemd[1]: Started logrotate.timer. Jul 2 07:56:23.315833 systemd[1]: Started mdadm.timer. Jul 2 07:56:23.322682 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 07:56:23.331623 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:56:23.331695 systemd[1]: Reached target paths.target. Jul 2 07:56:23.338576 systemd[1]: Reached target timers.target. Jul 2 07:56:23.346035 systemd[1]: Listening on dbus.socket. Jul 2 07:56:23.354965 systemd[1]: Starting docker.socket... Jul 2 07:56:23.366797 systemd[1]: Listening on sshd.socket. Jul 2 07:56:23.373801 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:56:23.373896 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:56:23.375057 systemd[1]: Finished ensure-sysext.service. Jul 2 07:56:23.383954 systemd[1]: Listening on docker.socket. Jul 2 07:56:23.391779 systemd[1]: Reached target sockets.target. Jul 2 07:56:23.400693 systemd[1]: Reached target basic.target. Jul 2 07:56:23.407659 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:56:23.407705 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:56:23.409349 systemd[1]: Starting containerd.service... Jul 2 07:56:23.418022 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 2 07:56:23.426846 systemd[1]: Starting dbus.service... Jul 2 07:56:23.439150 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 07:56:23.448284 systemd[1]: Starting extend-filesystems.service... Jul 2 07:56:23.458779 jq[1202]: false Jul 2 07:56:23.455609 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 07:56:23.458331 systemd[1]: Starting kubelet.service... Jul 2 07:56:23.467608 systemd[1]: Starting motdgen.service... Jul 2 07:56:23.476343 systemd[1]: Starting oem-gce.service... Jul 2 07:56:23.486294 systemd[1]: Starting prepare-helm.service... Jul 2 07:56:23.495565 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 07:56:23.504380 systemd[1]: Starting sshd-keygen.service... Jul 2 07:56:23.517625 extend-filesystems[1203]: Found loop1 Jul 2 07:56:23.517625 extend-filesystems[1203]: Found sda Jul 2 07:56:23.517625 extend-filesystems[1203]: Found sda1 Jul 2 07:56:23.517625 extend-filesystems[1203]: Found sda2 Jul 2 07:56:23.517625 extend-filesystems[1203]: Found sda3 Jul 2 07:56:23.517625 extend-filesystems[1203]: Found usr Jul 2 07:56:23.517625 extend-filesystems[1203]: Found sda4 Jul 2 07:56:23.517625 extend-filesystems[1203]: Found sda6 Jul 2 07:56:23.517625 extend-filesystems[1203]: Found sda7 Jul 2 07:56:23.517625 extend-filesystems[1203]: Found sda9 Jul 2 07:56:23.517625 extend-filesystems[1203]: Checking size of /dev/sda9 Jul 2 07:56:23.690889 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Jul 2 07:56:23.515901 systemd[1]: Starting systemd-logind.service... Jul 2 07:56:23.691280 extend-filesystems[1203]: Resized partition /dev/sda9 Jul 2 07:56:23.540203 dbus-daemon[1201]: [system] SELinux support is enabled Jul 2 07:56:23.522618 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:56:23.702502 extend-filesystems[1241]: resize2fs 1.46.5 (30-Dec-2021) Jul 2 07:56:23.748535 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Jul 2 07:56:23.748613 kernel: loop2: detected capacity change from 0 to 2097152 Jul 2 07:56:23.543206 dbus-daemon[1201]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1034 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Jul 2 07:56:23.748778 update_engine[1224]: I0702 07:56:23.718598 1224 main.cc:92] Flatcar Update Engine starting Jul 2 07:56:23.748778 update_engine[1224]: I0702 07:56:23.725492 1224 update_check_scheduler.cc:74] Next update check in 11m42s Jul 2 07:56:23.522749 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Jul 2 07:56:23.607965 dbus-daemon[1201]: [system] Successfully activated service 'org.freedesktop.systemd1' Jul 2 07:56:23.749460 jq[1226]: true Jul 2 07:56:23.523561 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 07:56:23.524810 systemd[1]: Starting update-engine.service... Jul 2 07:56:23.535555 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 07:56:23.545144 systemd[1]: Started dbus.service. Jul 2 07:56:23.558244 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:56:23.751169 mkfs.ext4[1238]: mke2fs 1.46.5 (30-Dec-2021) Jul 2 07:56:23.751169 mkfs.ext4[1238]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Jul 2 07:56:23.751169 mkfs.ext4[1238]: Creating filesystem with 262144 4k blocks and 65536 inodes Jul 2 07:56:23.751169 mkfs.ext4[1238]: Filesystem UUID: 6a8459ad-0649-4dde-8969-cae8fcf64cd1 Jul 2 07:56:23.751169 mkfs.ext4[1238]: Superblock backups stored on blocks: Jul 2 07:56:23.751169 mkfs.ext4[1238]: 32768, 98304, 163840, 229376 Jul 2 07:56:23.751169 mkfs.ext4[1238]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Jul 2 07:56:23.751169 mkfs.ext4[1238]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Jul 2 07:56:23.751169 mkfs.ext4[1238]: Creating journal (8192 blocks): done Jul 2 07:56:23.751169 mkfs.ext4[1238]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Jul 2 07:56:23.559526 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 07:56:23.567659 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:56:23.752215 jq[1236]: true Jul 2 07:56:23.568073 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 07:56:23.606626 systemd[1]: Created slice system-sshd.slice. Jul 2 07:56:23.615598 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 07:56:23.615647 systemd[1]: Reached target system-config.target. Jul 2 07:56:23.615841 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 07:56:23.753551 umount[1251]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Jul 2 07:56:23.615876 systemd[1]: Reached target user-config.target. Jul 2 07:56:23.645092 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:56:23.645347 systemd[1]: Finished motdgen.service. Jul 2 07:56:23.672984 systemd[1]: Starting systemd-hostnamed.service... Jul 2 07:56:23.725147 systemd[1]: Started update-engine.service. Jul 2 07:56:23.743921 systemd[1]: Started locksmithd.service. Jul 2 07:56:23.755065 tar[1233]: linux-amd64/helm Jul 2 07:56:23.758522 extend-filesystems[1241]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Jul 2 07:56:23.758522 extend-filesystems[1241]: old_desc_blocks = 1, new_desc_blocks = 2 Jul 2 07:56:23.758522 extend-filesystems[1241]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Jul 2 07:56:23.758475 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:56:23.796798 extend-filesystems[1203]: Resized filesystem in /dev/sda9 Jul 2 07:56:23.758771 systemd[1]: Finished extend-filesystems.service. Jul 2 07:56:23.825461 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 07:56:23.872899 bash[1270]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:56:23.873957 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 07:56:23.913016 systemd-logind[1222]: Watching system buttons on /dev/input/event1 (Power Button) Jul 2 07:56:23.913060 systemd-logind[1222]: Watching system buttons on /dev/input/event2 (Sleep Button) Jul 2 07:56:23.913092 systemd-logind[1222]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 07:56:23.922748 systemd-logind[1222]: New seat seat0. Jul 2 07:56:23.931261 systemd[1]: Started systemd-logind.service. Jul 2 07:56:23.934795 env[1237]: time="2024-07-02T07:56:23.934731199Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 07:56:24.114423 coreos-metadata[1200]: Jul 02 07:56:24.113 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Jul 2 07:56:24.123769 coreos-metadata[1200]: Jul 02 07:56:24.123 INFO Fetch failed with 404: resource not found Jul 2 07:56:24.123920 coreos-metadata[1200]: Jul 02 07:56:24.123 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Jul 2 07:56:24.125365 coreos-metadata[1200]: Jul 02 07:56:24.124 INFO Fetch successful Jul 2 07:56:24.125365 coreos-metadata[1200]: Jul 02 07:56:24.124 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Jul 2 07:56:24.125674 coreos-metadata[1200]: Jul 02 07:56:24.125 INFO Fetch failed with 404: resource not found Jul 2 07:56:24.125742 coreos-metadata[1200]: Jul 02 07:56:24.125 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Jul 2 07:56:24.126448 coreos-metadata[1200]: Jul 02 07:56:24.126 INFO Fetch failed with 404: resource not found Jul 2 07:56:24.126542 coreos-metadata[1200]: Jul 02 07:56:24.126 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Jul 2 07:56:24.130193 coreos-metadata[1200]: Jul 02 07:56:24.130 INFO Fetch successful Jul 2 07:56:24.132678 unknown[1200]: wrote ssh authorized keys file for user: core Jul 2 07:56:24.166400 update-ssh-keys[1276]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:56:24.167106 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 2 07:56:24.180516 env[1237]: time="2024-07-02T07:56:24.179059041Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 07:56:24.180516 env[1237]: time="2024-07-02T07:56:24.179406862Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:56:24.186089 env[1237]: time="2024-07-02T07:56:24.186026630Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:56:24.186089 env[1237]: time="2024-07-02T07:56:24.186084239Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:56:24.187578 env[1237]: time="2024-07-02T07:56:24.186713932Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:56:24.187578 env[1237]: time="2024-07-02T07:56:24.186756564Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 07:56:24.187578 env[1237]: time="2024-07-02T07:56:24.186780345Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 07:56:24.187578 env[1237]: time="2024-07-02T07:56:24.186798479Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 07:56:24.187578 env[1237]: time="2024-07-02T07:56:24.186923616Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:56:24.187578 env[1237]: time="2024-07-02T07:56:24.187237190Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:56:24.188078 env[1237]: time="2024-07-02T07:56:24.188033817Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:56:24.188167 env[1237]: time="2024-07-02T07:56:24.188076958Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 07:56:24.188223 env[1237]: time="2024-07-02T07:56:24.188163668Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 07:56:24.188223 env[1237]: time="2024-07-02T07:56:24.188183796Z" level=info msg="metadata content store policy set" policy=shared Jul 2 07:56:24.227470 env[1237]: time="2024-07-02T07:56:24.227085817Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 07:56:24.227470 env[1237]: time="2024-07-02T07:56:24.227171802Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 07:56:24.227470 env[1237]: time="2024-07-02T07:56:24.227195409Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 07:56:24.227470 env[1237]: time="2024-07-02T07:56:24.227258845Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 07:56:24.227470 env[1237]: time="2024-07-02T07:56:24.227283336Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 07:56:24.227470 env[1237]: time="2024-07-02T07:56:24.227373804Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 07:56:24.227470 env[1237]: time="2024-07-02T07:56:24.227395942Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 07:56:24.229552 env[1237]: time="2024-07-02T07:56:24.227418942Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 07:56:24.229716 env[1237]: time="2024-07-02T07:56:24.229684451Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 07:56:24.229855 env[1237]: time="2024-07-02T07:56:24.229829482Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 07:56:24.230241 env[1237]: time="2024-07-02T07:56:24.230210464Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 07:56:24.230372 env[1237]: time="2024-07-02T07:56:24.230348492Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 07:56:24.230654 env[1237]: time="2024-07-02T07:56:24.230628973Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 07:56:24.230896 env[1237]: time="2024-07-02T07:56:24.230872201Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 07:56:24.231508 env[1237]: time="2024-07-02T07:56:24.231480426Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 07:56:24.231666 env[1237]: time="2024-07-02T07:56:24.231643556Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 07:56:24.231783 env[1237]: time="2024-07-02T07:56:24.231761311Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 07:56:24.232018 env[1237]: time="2024-07-02T07:56:24.231991636Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 07:56:24.232222 env[1237]: time="2024-07-02T07:56:24.232196091Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 07:56:24.232355 env[1237]: time="2024-07-02T07:56:24.232332684Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 07:56:24.232491 env[1237]: time="2024-07-02T07:56:24.232466204Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 07:56:24.232621 env[1237]: time="2024-07-02T07:56:24.232599282Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 07:56:24.232737 env[1237]: time="2024-07-02T07:56:24.232716253Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 07:56:24.232831 env[1237]: time="2024-07-02T07:56:24.232812313Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 07:56:24.232928 env[1237]: time="2024-07-02T07:56:24.232908708Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 07:56:24.233049 env[1237]: time="2024-07-02T07:56:24.233029302Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 07:56:24.233307 env[1237]: time="2024-07-02T07:56:24.233283287Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 07:56:24.233442 env[1237]: time="2024-07-02T07:56:24.233410481Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 07:56:24.233558 env[1237]: time="2024-07-02T07:56:24.233536904Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 07:56:24.233684 env[1237]: time="2024-07-02T07:56:24.233661363Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 07:56:24.233792 env[1237]: time="2024-07-02T07:56:24.233767800Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 07:56:24.233885 env[1237]: time="2024-07-02T07:56:24.233865257Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 07:56:24.233990 env[1237]: time="2024-07-02T07:56:24.233968138Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 07:56:24.234122 env[1237]: time="2024-07-02T07:56:24.234100050Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 07:56:24.234685 env[1237]: time="2024-07-02T07:56:24.234590371Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 07:56:24.238483 env[1237]: time="2024-07-02T07:56:24.234891258Z" level=info msg="Connect containerd service" Jul 2 07:56:24.238483 env[1237]: time="2024-07-02T07:56:24.234958878Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 07:56:24.244302 env[1237]: time="2024-07-02T07:56:24.244242124Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:56:24.245713 env[1237]: time="2024-07-02T07:56:24.245641900Z" level=info msg="Start subscribing containerd event" Jul 2 07:56:24.249368 env[1237]: time="2024-07-02T07:56:24.249333785Z" level=info msg="Start recovering state" Jul 2 07:56:24.255296 env[1237]: time="2024-07-02T07:56:24.249278062Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 07:56:24.255718 env[1237]: time="2024-07-02T07:56:24.255582367Z" level=info msg="Start event monitor" Jul 2 07:56:24.256999 env[1237]: time="2024-07-02T07:56:24.256966959Z" level=info msg="Start snapshots syncer" Jul 2 07:56:24.257137 env[1237]: time="2024-07-02T07:56:24.257115856Z" level=info msg="Start cni network conf syncer for default" Jul 2 07:56:24.257229 env[1237]: time="2024-07-02T07:56:24.257210994Z" level=info msg="Start streaming server" Jul 2 07:56:24.257744 env[1237]: time="2024-07-02T07:56:24.257717153Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 07:56:24.258032 dbus-daemon[1201]: [system] Successfully activated service 'org.freedesktop.hostname1' Jul 2 07:56:24.258292 systemd[1]: Started systemd-hostnamed.service. Jul 2 07:56:24.265598 dbus-daemon[1201]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1249 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Jul 2 07:56:24.271471 systemd[1]: Starting polkit.service... Jul 2 07:56:24.274083 env[1237]: time="2024-07-02T07:56:24.272601280Z" level=info msg="containerd successfully booted in 0.416464s" Jul 2 07:56:24.279091 systemd[1]: Started containerd.service. Jul 2 07:56:24.376976 polkitd[1283]: Started polkitd version 121 Jul 2 07:56:24.402130 polkitd[1283]: Loading rules from directory /etc/polkit-1/rules.d Jul 2 07:56:24.402217 polkitd[1283]: Loading rules from directory /usr/share/polkit-1/rules.d Jul 2 07:56:24.407062 polkitd[1283]: Finished loading, compiling and executing 2 rules Jul 2 07:56:24.407786 dbus-daemon[1201]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Jul 2 07:56:24.408011 systemd[1]: Started polkit.service. Jul 2 07:56:24.408838 polkitd[1283]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Jul 2 07:56:24.453156 systemd-hostnamed[1249]: Hostname set to (transient) Jul 2 07:56:24.456891 systemd-resolved[1163]: System hostname changed to 'ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal'. Jul 2 07:56:25.484321 tar[1233]: linux-amd64/LICENSE Jul 2 07:56:25.484875 tar[1233]: linux-amd64/README.md Jul 2 07:56:25.496942 systemd[1]: Finished prepare-helm.service. Jul 2 07:56:25.613742 systemd[1]: Started kubelet.service. Jul 2 07:56:27.034584 kubelet[1293]: E0702 07:56:27.034398 1293 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:56:27.037326 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:56:27.037589 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:56:27.037947 systemd[1]: kubelet.service: Consumed 1.467s CPU time. Jul 2 07:56:27.399048 sshd_keygen[1228]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 07:56:27.411705 locksmithd[1260]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 07:56:27.440033 systemd[1]: Finished sshd-keygen.service. Jul 2 07:56:27.448897 systemd[1]: Starting issuegen.service... Jul 2 07:56:27.457704 systemd[1]: Started sshd@0-10.128.0.73:22-147.75.109.163:59542.service. Jul 2 07:56:27.469758 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:56:27.469992 systemd[1]: Finished issuegen.service. Jul 2 07:56:27.480270 systemd[1]: Starting systemd-user-sessions.service... Jul 2 07:56:27.494369 systemd[1]: Finished systemd-user-sessions.service. Jul 2 07:56:27.504790 systemd[1]: Started getty@tty1.service. Jul 2 07:56:27.513770 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 07:56:27.521906 systemd[1]: Reached target getty.target. Jul 2 07:56:27.775775 sshd[1315]: Accepted publickey for core from 147.75.109.163 port 59542 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:56:27.778746 sshd[1315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:27.797365 systemd[1]: Created slice user-500.slice. Jul 2 07:56:27.806880 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 07:56:27.818320 systemd-logind[1222]: New session 1 of user core. Jul 2 07:56:27.825394 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 07:56:27.835740 systemd[1]: Starting user@500.service... Jul 2 07:56:27.857391 (systemd)[1321]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:28.034979 systemd[1321]: Queued start job for default target default.target. Jul 2 07:56:28.036821 systemd[1321]: Reached target paths.target. Jul 2 07:56:28.036857 systemd[1321]: Reached target sockets.target. Jul 2 07:56:28.036882 systemd[1321]: Reached target timers.target. Jul 2 07:56:28.036905 systemd[1321]: Reached target basic.target. Jul 2 07:56:28.036975 systemd[1321]: Reached target default.target. Jul 2 07:56:28.037027 systemd[1321]: Startup finished in 167ms. Jul 2 07:56:28.037067 systemd[1]: Started user@500.service. Jul 2 07:56:28.046043 systemd[1]: Started session-1.scope. Jul 2 07:56:28.273208 systemd[1]: Started sshd@1-10.128.0.73:22-147.75.109.163:59548.service. Jul 2 07:56:28.587626 sshd[1330]: Accepted publickey for core from 147.75.109.163 port 59548 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:56:28.588704 sshd[1330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:28.596479 systemd[1]: Started session-2.scope. Jul 2 07:56:28.597727 systemd-logind[1222]: New session 2 of user core. Jul 2 07:56:28.799146 sshd[1330]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:28.803287 systemd[1]: sshd@1-10.128.0.73:22-147.75.109.163:59548.service: Deactivated successfully. Jul 2 07:56:28.804471 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 07:56:28.806901 systemd-logind[1222]: Session 2 logged out. Waiting for processes to exit. Jul 2 07:56:28.808668 systemd-logind[1222]: Removed session 2. Jul 2 07:56:28.842832 systemd[1]: Started sshd@2-10.128.0.73:22-147.75.109.163:59560.service. Jul 2 07:56:29.145772 sshd[1336]: Accepted publickey for core from 147.75.109.163 port 59560 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:56:29.148746 sshd[1336]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:29.161786 systemd[1]: Started session-3.scope. Jul 2 07:56:29.163056 systemd-logind[1222]: New session 3 of user core. Jul 2 07:56:29.367579 sshd[1336]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:29.372081 systemd[1]: sshd@2-10.128.0.73:22-147.75.109.163:59560.service: Deactivated successfully. Jul 2 07:56:29.373183 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 07:56:29.375997 systemd-logind[1222]: Session 3 logged out. Waiting for processes to exit. Jul 2 07:56:29.378917 systemd-logind[1222]: Removed session 3. Jul 2 07:56:29.819611 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Jul 2 07:56:31.815522 kernel: loop2: detected capacity change from 0 to 2097152 Jul 2 07:56:31.832102 systemd-nspawn[1342]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Jul 2 07:56:31.832102 systemd-nspawn[1342]: Press ^] three times within 1s to kill container. Jul 2 07:56:31.848467 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:56:31.939247 systemd[1]: Started oem-gce.service. Jul 2 07:56:31.948090 systemd[1]: Reached target multi-user.target. Jul 2 07:56:31.958863 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 07:56:31.972704 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:56:31.972950 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 07:56:31.983831 systemd[1]: Startup finished in 1.095s (kernel) + 7.486s (initrd) + 16.619s (userspace) = 25.201s. Jul 2 07:56:32.003668 systemd-nspawn[1342]: + '[' -e /etc/default/instance_configs.cfg.template ']' Jul 2 07:56:32.003668 systemd-nspawn[1342]: + echo -e '[InstanceSetup]\nset_host_keys = false' Jul 2 07:56:32.004104 systemd-nspawn[1342]: + /usr/bin/google_instance_setup Jul 2 07:56:32.626462 instance-setup[1348]: INFO Running google_set_multiqueue. Jul 2 07:56:32.640915 instance-setup[1348]: INFO Set channels for eth0 to 2. Jul 2 07:56:32.644602 instance-setup[1348]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Jul 2 07:56:32.645951 instance-setup[1348]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Jul 2 07:56:32.646536 instance-setup[1348]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Jul 2 07:56:32.647745 instance-setup[1348]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Jul 2 07:56:32.648205 instance-setup[1348]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Jul 2 07:56:32.649817 instance-setup[1348]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Jul 2 07:56:32.650156 instance-setup[1348]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Jul 2 07:56:32.651608 instance-setup[1348]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Jul 2 07:56:32.663221 instance-setup[1348]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Jul 2 07:56:32.663773 instance-setup[1348]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Jul 2 07:56:32.701986 systemd-nspawn[1342]: + /usr/bin/google_metadata_script_runner --script-type startup Jul 2 07:56:33.034308 startup-script[1379]: INFO Starting startup scripts. Jul 2 07:56:33.047938 startup-script[1379]: INFO No startup scripts found in metadata. Jul 2 07:56:33.048099 startup-script[1379]: INFO Finished running startup scripts. Jul 2 07:56:33.079384 systemd-nspawn[1342]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Jul 2 07:56:33.079384 systemd-nspawn[1342]: + daemon_pids=() Jul 2 07:56:33.080072 systemd-nspawn[1342]: + for d in accounts clock_skew network Jul 2 07:56:33.080072 systemd-nspawn[1342]: + daemon_pids+=($!) Jul 2 07:56:33.080072 systemd-nspawn[1342]: + for d in accounts clock_skew network Jul 2 07:56:33.080072 systemd-nspawn[1342]: + daemon_pids+=($!) Jul 2 07:56:33.080072 systemd-nspawn[1342]: + for d in accounts clock_skew network Jul 2 07:56:33.080321 systemd-nspawn[1342]: + daemon_pids+=($!) Jul 2 07:56:33.080409 systemd-nspawn[1342]: + NOTIFY_SOCKET=/run/systemd/notify Jul 2 07:56:33.080409 systemd-nspawn[1342]: + /usr/bin/systemd-notify --ready Jul 2 07:56:33.080886 systemd-nspawn[1342]: + /usr/bin/google_clock_skew_daemon Jul 2 07:56:33.081140 systemd-nspawn[1342]: + /usr/bin/google_network_daemon Jul 2 07:56:33.081524 systemd-nspawn[1342]: + /usr/bin/google_accounts_daemon Jul 2 07:56:33.142161 systemd-nspawn[1342]: + wait -n 36 37 38 Jul 2 07:56:33.692384 google-clock-skew[1383]: INFO Starting Google Clock Skew daemon. Jul 2 07:56:33.709219 google-networking[1384]: INFO Starting Google Networking daemon. Jul 2 07:56:33.712200 google-clock-skew[1383]: INFO Clock drift token has changed: 0. Jul 2 07:56:33.724928 systemd-nspawn[1342]: hwclock: Cannot access the Hardware Clock via any known method. Jul 2 07:56:33.725141 systemd-nspawn[1342]: hwclock: Use the --verbose option to see the details of our search for an access method. Jul 2 07:56:33.725966 google-clock-skew[1383]: WARNING Failed to sync system time with hardware clock. Jul 2 07:56:33.847414 groupadd[1394]: group added to /etc/group: name=google-sudoers, GID=1000 Jul 2 07:56:33.851921 groupadd[1394]: group added to /etc/gshadow: name=google-sudoers Jul 2 07:56:33.856550 groupadd[1394]: new group: name=google-sudoers, GID=1000 Jul 2 07:56:33.869776 google-accounts[1382]: INFO Starting Google Accounts daemon. Jul 2 07:56:33.894345 google-accounts[1382]: WARNING OS Login not installed. Jul 2 07:56:33.895383 google-accounts[1382]: INFO Creating a new user account for 0. Jul 2 07:56:33.903621 systemd-nspawn[1342]: useradd: invalid user name '0': use --badname to ignore Jul 2 07:56:33.904278 google-accounts[1382]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Jul 2 07:56:37.288876 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 07:56:37.289263 systemd[1]: Stopped kubelet.service. Jul 2 07:56:37.289349 systemd[1]: kubelet.service: Consumed 1.467s CPU time. Jul 2 07:56:37.291899 systemd[1]: Starting kubelet.service... Jul 2 07:56:37.520486 systemd[1]: Started kubelet.service. Jul 2 07:56:37.590837 kubelet[1408]: E0702 07:56:37.590663 1408 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:56:37.595246 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:56:37.595447 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:56:39.307156 systemd[1]: Started sshd@3-10.128.0.73:22-147.75.109.163:35482.service. Jul 2 07:56:39.598392 sshd[1415]: Accepted publickey for core from 147.75.109.163 port 35482 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:56:39.600155 sshd[1415]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:39.606488 systemd-logind[1222]: New session 4 of user core. Jul 2 07:56:39.607217 systemd[1]: Started session-4.scope. Jul 2 07:56:39.812280 sshd[1415]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:39.816173 systemd[1]: sshd@3-10.128.0.73:22-147.75.109.163:35482.service: Deactivated successfully. Jul 2 07:56:39.817189 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 07:56:39.818055 systemd-logind[1222]: Session 4 logged out. Waiting for processes to exit. Jul 2 07:56:39.819277 systemd-logind[1222]: Removed session 4. Jul 2 07:56:39.857860 systemd[1]: Started sshd@4-10.128.0.73:22-147.75.109.163:35488.service. Jul 2 07:56:40.148641 sshd[1421]: Accepted publickey for core from 147.75.109.163 port 35488 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:56:40.150417 sshd[1421]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:40.156746 systemd-logind[1222]: New session 5 of user core. Jul 2 07:56:40.157526 systemd[1]: Started session-5.scope. Jul 2 07:56:40.357031 sshd[1421]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:40.360881 systemd[1]: sshd@4-10.128.0.73:22-147.75.109.163:35488.service: Deactivated successfully. Jul 2 07:56:40.361959 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 07:56:40.362835 systemd-logind[1222]: Session 5 logged out. Waiting for processes to exit. Jul 2 07:56:40.364048 systemd-logind[1222]: Removed session 5. Jul 2 07:56:40.403012 systemd[1]: Started sshd@5-10.128.0.73:22-147.75.109.163:35496.service. Jul 2 07:56:40.691870 sshd[1427]: Accepted publickey for core from 147.75.109.163 port 35496 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:56:40.693887 sshd[1427]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:40.700407 systemd[1]: Started session-6.scope. Jul 2 07:56:40.701188 systemd-logind[1222]: New session 6 of user core. Jul 2 07:56:40.904901 sshd[1427]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:40.908913 systemd[1]: sshd@5-10.128.0.73:22-147.75.109.163:35496.service: Deactivated successfully. Jul 2 07:56:40.909919 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 07:56:40.910746 systemd-logind[1222]: Session 6 logged out. Waiting for processes to exit. Jul 2 07:56:40.911893 systemd-logind[1222]: Removed session 6. Jul 2 07:56:40.951370 systemd[1]: Started sshd@6-10.128.0.73:22-147.75.109.163:35504.service. Jul 2 07:56:41.244493 sshd[1433]: Accepted publickey for core from 147.75.109.163 port 35504 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:56:41.246147 sshd[1433]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:41.252533 systemd-logind[1222]: New session 7 of user core. Jul 2 07:56:41.252732 systemd[1]: Started session-7.scope. Jul 2 07:56:41.442780 sudo[1436]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 07:56:41.443229 sudo[1436]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:56:41.452716 dbus-daemon[1201]: \xd0=\x9b\xd2eU: received setenforce notice (enforcing=1420827584) Jul 2 07:56:41.455020 sudo[1436]: pam_unix(sudo:session): session closed for user root Jul 2 07:56:41.499733 sshd[1433]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:41.504568 systemd[1]: sshd@6-10.128.0.73:22-147.75.109.163:35504.service: Deactivated successfully. Jul 2 07:56:41.505759 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 07:56:41.506741 systemd-logind[1222]: Session 7 logged out. Waiting for processes to exit. Jul 2 07:56:41.508088 systemd-logind[1222]: Removed session 7. Jul 2 07:56:41.545402 systemd[1]: Started sshd@7-10.128.0.73:22-147.75.109.163:35518.service. Jul 2 07:56:41.837390 sshd[1440]: Accepted publickey for core from 147.75.109.163 port 35518 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:56:41.839000 sshd[1440]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:41.845523 systemd-logind[1222]: New session 8 of user core. Jul 2 07:56:41.845756 systemd[1]: Started session-8.scope. Jul 2 07:56:42.015146 sudo[1444]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 07:56:42.015596 sudo[1444]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:56:42.019767 sudo[1444]: pam_unix(sudo:session): session closed for user root Jul 2 07:56:42.031909 sudo[1443]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 07:56:42.032316 sudo[1443]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:56:42.044570 systemd[1]: Stopping audit-rules.service... Jul 2 07:56:42.045000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:56:42.051938 kernel: kauditd_printk_skb: 215 callbacks suppressed Jul 2 07:56:42.052028 kernel: audit: type=1305 audit(1719907002.045:198): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:56:42.052068 auditctl[1447]: No rules Jul 2 07:56:42.052870 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 07:56:42.053111 systemd[1]: Stopped audit-rules.service. Jul 2 07:56:42.045000 audit[1447]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeb3d4dc30 a2=420 a3=0 items=0 ppid=1 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:42.068120 systemd[1]: Starting audit-rules.service... Jul 2 07:56:42.107451 kernel: audit: type=1300 audit(1719907002.045:198): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeb3d4dc30 a2=420 a3=0 items=0 ppid=1 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:42.107586 kernel: audit: type=1327 audit(1719907002.045:198): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:56:42.045000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:56:42.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:42.131318 augenrules[1464]: No rules Jul 2 07:56:42.131618 kernel: audit: type=1131 audit(1719907002.051:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:42.132075 systemd[1]: Finished audit-rules.service. Jul 2 07:56:42.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:42.137680 sudo[1443]: pam_unix(sudo:session): session closed for user root Jul 2 07:56:42.137000 audit[1443]: USER_END pid=1443 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:56:42.155623 kernel: audit: type=1130 audit(1719907002.132:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:42.155708 kernel: audit: type=1106 audit(1719907002.137:201): pid=1443 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:56:42.137000 audit[1443]: CRED_DISP pid=1443 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:56:42.202795 kernel: audit: type=1104 audit(1719907002.137:202): pid=1443 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:56:42.203579 sshd[1440]: pam_unix(sshd:session): session closed for user core Jul 2 07:56:42.203000 audit[1440]: USER_END pid=1440 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.208348 systemd[1]: sshd@7-10.128.0.73:22-147.75.109.163:35518.service: Deactivated successfully. Jul 2 07:56:42.209386 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 07:56:42.211140 systemd-logind[1222]: Session 8 logged out. Waiting for processes to exit. Jul 2 07:56:42.212755 systemd-logind[1222]: Removed session 8. Jul 2 07:56:42.204000 audit[1440]: CRED_DISP pid=1440 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.246710 systemd[1]: Started sshd@8-10.128.0.73:22-147.75.109.163:35534.service. Jul 2 07:56:42.263083 kernel: audit: type=1106 audit(1719907002.203:203): pid=1440 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.263199 kernel: audit: type=1104 audit(1719907002.204:204): pid=1440 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.263248 kernel: audit: type=1131 audit(1719907002.204:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.73:22-147.75.109.163:35518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:42.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.73:22-147.75.109.163:35518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:42.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.73:22-147.75.109.163:35534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:42.540000 audit[1470]: USER_ACCT pid=1470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.543707 sshd[1470]: Accepted publickey for core from 147.75.109.163 port 35534 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:56:42.542000 audit[1470]: CRED_ACQ pid=1470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.542000 audit[1470]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1c68c1e0 a2=3 a3=0 items=0 ppid=1 pid=1470 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:42.542000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:56:42.544748 sshd[1470]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:56:42.550502 systemd-logind[1222]: New session 9 of user core. Jul 2 07:56:42.551388 systemd[1]: Started session-9.scope. Jul 2 07:56:42.557000 audit[1470]: USER_START pid=1470 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.559000 audit[1472]: CRED_ACQ pid=1472 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:56:42.718000 audit[1473]: USER_ACCT pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:56:42.718787 sudo[1473]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 07:56:42.718000 audit[1473]: CRED_REFR pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:56:42.719212 sudo[1473]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:56:42.721000 audit[1473]: USER_START pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:56:42.751512 systemd[1]: Starting docker.service... Jul 2 07:56:42.805287 env[1483]: time="2024-07-02T07:56:42.804048978Z" level=info msg="Starting up" Jul 2 07:56:42.805900 env[1483]: time="2024-07-02T07:56:42.805849542Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:56:42.805900 env[1483]: time="2024-07-02T07:56:42.805876724Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:56:42.806064 env[1483]: time="2024-07-02T07:56:42.805905194Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 07:56:42.806064 env[1483]: time="2024-07-02T07:56:42.805922423Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:56:42.808676 env[1483]: time="2024-07-02T07:56:42.808654107Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 07:56:42.808775 env[1483]: time="2024-07-02T07:56:42.808760836Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 07:56:42.808860 env[1483]: time="2024-07-02T07:56:42.808842356Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 07:56:42.808935 env[1483]: time="2024-07-02T07:56:42.808923004Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 07:56:42.818445 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport788320008-merged.mount: Deactivated successfully. Jul 2 07:56:42.875260 env[1483]: time="2024-07-02T07:56:42.875199131Z" level=info msg="Loading containers: start." Jul 2 07:56:42.963000 audit[1513]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1513 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:42.963000 audit[1513]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff7917f640 a2=0 a3=7fff7917f62c items=0 ppid=1483 pid=1513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:42.963000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 07:56:42.965000 audit[1515]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1515 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:42.965000 audit[1515]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffe35ffa40 a2=0 a3=7fffe35ffa2c items=0 ppid=1483 pid=1515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:42.965000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 07:56:42.968000 audit[1517]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1517 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:42.968000 audit[1517]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffef09e310 a2=0 a3=7fffef09e2fc items=0 ppid=1483 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:42.968000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:56:42.971000 audit[1519]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1519 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:42.971000 audit[1519]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff2e27b940 a2=0 a3=7fff2e27b92c items=0 ppid=1483 pid=1519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:42.971000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:56:42.975000 audit[1521]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1521 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:42.975000 audit[1521]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd5c9585e0 a2=0 a3=7ffd5c9585cc items=0 ppid=1483 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:42.975000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 07:56:42.997000 audit[1526]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1526 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:42.997000 audit[1526]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffdd4f3690 a2=0 a3=7fffdd4f367c items=0 ppid=1483 pid=1526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:42.997000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 07:56:43.007000 audit[1528]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1528 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.007000 audit[1528]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc52a3bd60 a2=0 a3=7ffc52a3bd4c items=0 ppid=1483 pid=1528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.007000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 07:56:43.010000 audit[1530]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1530 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.010000 audit[1530]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc02c8eeb0 a2=0 a3=7ffc02c8ee9c items=0 ppid=1483 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.010000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 07:56:43.013000 audit[1532]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1532 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.013000 audit[1532]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd797b4e10 a2=0 a3=7ffd797b4dfc items=0 ppid=1483 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.013000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:56:43.026000 audit[1536]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1536 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.026000 audit[1536]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe3a2f17f0 a2=0 a3=7ffe3a2f17dc items=0 ppid=1483 pid=1536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.026000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:56:43.027000 audit[1537]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.027000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc0dd83200 a2=0 a3=7ffc0dd831ec items=0 ppid=1483 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.027000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:56:43.044455 kernel: Initializing XFRM netlink socket Jul 2 07:56:43.088409 env[1483]: time="2024-07-02T07:56:43.088271051Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 07:56:43.120000 audit[1545]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1545 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.120000 audit[1545]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe39f76ea0 a2=0 a3=7ffe39f76e8c items=0 ppid=1483 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.120000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 07:56:43.132000 audit[1548]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.132000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd49725250 a2=0 a3=7ffd4972523c items=0 ppid=1483 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.132000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 07:56:43.136000 audit[1551]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1551 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.136000 audit[1551]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc516b6a10 a2=0 a3=7ffc516b69fc items=0 ppid=1483 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.136000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 07:56:43.139000 audit[1553]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1553 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.139000 audit[1553]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdf0efa6d0 a2=0 a3=7ffdf0efa6bc items=0 ppid=1483 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.139000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 07:56:43.142000 audit[1555]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1555 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.142000 audit[1555]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe28d50c20 a2=0 a3=7ffe28d50c0c items=0 ppid=1483 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.142000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 07:56:43.145000 audit[1557]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1557 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.145000 audit[1557]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc1b59e4d0 a2=0 a3=7ffc1b59e4bc items=0 ppid=1483 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.145000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 07:56:43.149000 audit[1559]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1559 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.149000 audit[1559]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe857c9770 a2=0 a3=7ffe857c975c items=0 ppid=1483 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.149000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 07:56:43.161000 audit[1562]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1562 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.161000 audit[1562]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdff2d51c0 a2=0 a3=7ffdff2d51ac items=0 ppid=1483 pid=1562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.161000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 07:56:43.164000 audit[1564]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1564 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.164000 audit[1564]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe14da39f0 a2=0 a3=7ffe14da39dc items=0 ppid=1483 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.164000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 07:56:43.167000 audit[1566]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1566 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.167000 audit[1566]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc1f76b710 a2=0 a3=7ffc1f76b6fc items=0 ppid=1483 pid=1566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.167000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 07:56:43.170000 audit[1568]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1568 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.170000 audit[1568]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffca5b49cd0 a2=0 a3=7ffca5b49cbc items=0 ppid=1483 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.170000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 07:56:43.172340 systemd-networkd[1034]: docker0: Link UP Jul 2 07:56:43.183000 audit[1572]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1572 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.183000 audit[1572]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeb9c4beb0 a2=0 a3=7ffeb9c4be9c items=0 ppid=1483 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.183000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:56:43.185000 audit[1573]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1573 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:56:43.185000 audit[1573]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd8b64bd70 a2=0 a3=7ffd8b64bd5c items=0 ppid=1483 pid=1573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:43.185000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 07:56:43.187483 env[1483]: time="2024-07-02T07:56:43.187415603Z" level=info msg="Loading containers: done." Jul 2 07:56:43.203410 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1628083838-merged.mount: Deactivated successfully. Jul 2 07:56:43.216719 env[1483]: time="2024-07-02T07:56:43.216665781Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 07:56:43.216968 env[1483]: time="2024-07-02T07:56:43.216946328Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 2 07:56:43.217130 env[1483]: time="2024-07-02T07:56:43.217102998Z" level=info msg="Daemon has completed initialization" Jul 2 07:56:43.238142 systemd[1]: Started docker.service. Jul 2 07:56:43.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:43.250943 env[1483]: time="2024-07-02T07:56:43.250872961Z" level=info msg="API listen on /run/docker.sock" Jul 2 07:56:44.360594 env[1237]: time="2024-07-02T07:56:44.360534060Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.2\"" Jul 2 07:56:44.834924 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1655707403.mount: Deactivated successfully. Jul 2 07:56:46.782313 env[1237]: time="2024-07-02T07:56:46.782192198Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:46.785774 env[1237]: time="2024-07-02T07:56:46.785698151Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:56ce0fd9fb532bcb552ddbdbe3064189ce823a71693d97ff7a0a7a4ff6bffbbe,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:46.788884 env[1237]: time="2024-07-02T07:56:46.788828572Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:46.791987 env[1237]: time="2024-07-02T07:56:46.791942426Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:340ab4a1d66a60630a7a298aa0b2576fcd82e51ecdddb751cf61e5d3846fde2d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:46.793371 env[1237]: time="2024-07-02T07:56:46.793327554Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.2\" returns image reference \"sha256:56ce0fd9fb532bcb552ddbdbe3064189ce823a71693d97ff7a0a7a4ff6bffbbe\"" Jul 2 07:56:46.808392 env[1237]: time="2024-07-02T07:56:46.808346787Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.2\"" Jul 2 07:56:47.877797 kernel: kauditd_printk_skb: 84 callbacks suppressed Jul 2 07:56:47.878003 kernel: audit: type=1130 audit(1719907007.846:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:47.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:47.846979 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 07:56:47.847331 systemd[1]: Stopped kubelet.service. Jul 2 07:56:47.877349 systemd[1]: Starting kubelet.service... Jul 2 07:56:47.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:47.905850 kernel: audit: type=1131 audit(1719907007.846:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:48.144945 systemd[1]: Started kubelet.service. Jul 2 07:56:48.167787 kernel: audit: type=1130 audit(1719907008.144:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:48.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:48.248882 kubelet[1621]: E0702 07:56:48.248818 1621 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:56:48.251307 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:56:48.251557 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:56:48.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:56:48.274476 kernel: audit: type=1131 audit(1719907008.250:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:56:48.807075 env[1237]: time="2024-07-02T07:56:48.807001371Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:48.809957 env[1237]: time="2024-07-02T07:56:48.809909842Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e874818b3caac34f68704eb96bf248d0c8116b1262ab549d45d39dd3dd775974,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:48.812549 env[1237]: time="2024-07-02T07:56:48.812507160Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:48.815038 env[1237]: time="2024-07-02T07:56:48.814994771Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4c412bc1fc585ddeba10d34a02e7507ea787ec2c57256d4c18fd230377ab048e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:48.816112 env[1237]: time="2024-07-02T07:56:48.816058043Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.2\" returns image reference \"sha256:e874818b3caac34f68704eb96bf248d0c8116b1262ab549d45d39dd3dd775974\"" Jul 2 07:56:48.830489 env[1237]: time="2024-07-02T07:56:48.830422394Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.2\"" Jul 2 07:56:50.044780 env[1237]: time="2024-07-02T07:56:50.044705275Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:50.047812 env[1237]: time="2024-07-02T07:56:50.047763279Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7820c83aa139453522e9028341d0d4f23ca2721ec80c7a47425446d11157b940,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:50.050457 env[1237]: time="2024-07-02T07:56:50.050398713Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:50.053161 env[1237]: time="2024-07-02T07:56:50.053080684Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:0ed75a333704f5d315395c6ec04d7af7405715537069b65d40b43ec1c8e030bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:50.054148 env[1237]: time="2024-07-02T07:56:50.054089668Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.2\" returns image reference \"sha256:7820c83aa139453522e9028341d0d4f23ca2721ec80c7a47425446d11157b940\"" Jul 2 07:56:50.068543 env[1237]: time="2024-07-02T07:56:50.068481600Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\"" Jul 2 07:56:51.197607 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1945074087.mount: Deactivated successfully. Jul 2 07:56:51.906250 env[1237]: time="2024-07-02T07:56:51.906179295Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:51.909689 env[1237]: time="2024-07-02T07:56:51.909635010Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:53c535741fb446f6b34d720fdc5748db368ef96771111f3892682e6eab8f3772,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:51.912530 env[1237]: time="2024-07-02T07:56:51.912480089Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:51.914643 env[1237]: time="2024-07-02T07:56:51.914590633Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8a44c6e094af3dea3de57fa967e201608a358a3bd8b4e3f31ab905bbe4108aec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:51.915291 env[1237]: time="2024-07-02T07:56:51.915243727Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\" returns image reference \"sha256:53c535741fb446f6b34d720fdc5748db368ef96771111f3892682e6eab8f3772\"" Jul 2 07:56:51.929789 env[1237]: time="2024-07-02T07:56:51.929732777Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Jul 2 07:56:52.295788 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3547399642.mount: Deactivated successfully. Jul 2 07:56:53.501397 env[1237]: time="2024-07-02T07:56:53.501321466Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:53.504374 env[1237]: time="2024-07-02T07:56:53.504328434Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:53.512183 env[1237]: time="2024-07-02T07:56:53.512139768Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:53.516201 env[1237]: time="2024-07-02T07:56:53.516155167Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:53.518001 env[1237]: time="2024-07-02T07:56:53.517953097Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Jul 2 07:56:53.533338 env[1237]: time="2024-07-02T07:56:53.533295002Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Jul 2 07:56:53.880001 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1413550893.mount: Deactivated successfully. Jul 2 07:56:53.889017 env[1237]: time="2024-07-02T07:56:53.888963589Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:53.892309 env[1237]: time="2024-07-02T07:56:53.892265321Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:53.895066 env[1237]: time="2024-07-02T07:56:53.895029268Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:53.897190 env[1237]: time="2024-07-02T07:56:53.897151495Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:53.897950 env[1237]: time="2024-07-02T07:56:53.897909060Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Jul 2 07:56:53.911141 env[1237]: time="2024-07-02T07:56:53.911101916Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Jul 2 07:56:54.304855 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2639607989.mount: Deactivated successfully. Jul 2 07:56:54.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:54.485934 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jul 2 07:56:54.509461 kernel: audit: type=1131 audit(1719907014.485:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:54.529000 audit: BPF prog-id=46 op=UNLOAD Jul 2 07:56:54.544394 kernel: audit: type=1334 audit(1719907014.529:245): prog-id=46 op=UNLOAD Jul 2 07:56:54.544520 kernel: audit: type=1334 audit(1719907014.529:246): prog-id=45 op=UNLOAD Jul 2 07:56:54.529000 audit: BPF prog-id=45 op=UNLOAD Jul 2 07:56:54.529000 audit: BPF prog-id=44 op=UNLOAD Jul 2 07:56:54.552460 kernel: audit: type=1334 audit(1719907014.529:247): prog-id=44 op=UNLOAD Jul 2 07:56:56.952887 env[1237]: time="2024-07-02T07:56:56.952811809Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:56.955543 env[1237]: time="2024-07-02T07:56:56.955500535Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:56.960289 env[1237]: time="2024-07-02T07:56:56.960230670Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:56.965248 env[1237]: time="2024-07-02T07:56:56.965194020Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:56.965750 env[1237]: time="2024-07-02T07:56:56.965706333Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Jul 2 07:56:58.385827 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Jul 2 07:56:58.386132 systemd[1]: Stopped kubelet.service. Jul 2 07:56:58.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:58.410457 kernel: audit: type=1130 audit(1719907018.385:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:58.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:58.412026 systemd[1]: Starting kubelet.service... Jul 2 07:56:58.435490 kernel: audit: type=1131 audit(1719907018.385:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:58.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:58.673420 systemd[1]: Started kubelet.service. Jul 2 07:56:58.696901 kernel: audit: type=1130 audit(1719907018.673:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:56:58.772558 kubelet[1721]: E0702 07:56:58.772510 1721 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:56:58.798758 kernel: audit: type=1131 audit(1719907018.775:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:56:58.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:56:58.775472 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:56:58.775697 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:57:00.222487 systemd[1]: Stopped kubelet.service. Jul 2 07:57:00.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:00.226403 systemd[1]: Starting kubelet.service... Jul 2 07:57:00.248448 kernel: audit: type=1130 audit(1719907020.221:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:00.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:00.273582 kernel: audit: type=1131 audit(1719907020.221:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:00.275329 systemd[1]: Reloading. Jul 2 07:57:00.411425 /usr/lib/systemd/system-generators/torcx-generator[1752]: time="2024-07-02T07:57:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:57:00.412038 /usr/lib/systemd/system-generators/torcx-generator[1752]: time="2024-07-02T07:57:00Z" level=info msg="torcx already run" Jul 2 07:57:00.524256 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:57:00.524284 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:57:00.550396 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:57:00.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.677244 kernel: audit: type=1400 audit(1719907020.654:254): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.699308 kernel: audit: type=1400 audit(1719907020.654:255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.722858 kernel: audit: type=1400 audit(1719907020.654:256): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.774057 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:57:00.774216 kernel: audit: type=1400 audit(1719907020.654:257): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.774267 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 07:57:00.774317 kernel: audit: backlog limit exceeded Jul 2 07:57:00.774358 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 07:57:00.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.675000 audit: BPF prog-id=49 op=LOAD Jul 2 07:57:00.675000 audit: BPF prog-id=39 op=UNLOAD Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit: BPF prog-id=50 op=LOAD Jul 2 07:57:00.697000 audit: BPF prog-id=40 op=UNLOAD Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.718000 audit: BPF prog-id=51 op=LOAD Jul 2 07:57:00.718000 audit: BPF prog-id=41 op=UNLOAD Jul 2 07:57:00.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.723000 audit: BPF prog-id=52 op=LOAD Jul 2 07:57:00.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.723000 audit: BPF prog-id=53 op=LOAD Jul 2 07:57:00.723000 audit: BPF prog-id=42 op=UNLOAD Jul 2 07:57:00.723000 audit: BPF prog-id=43 op=UNLOAD Jul 2 07:57:00.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.727000 audit: BPF prog-id=54 op=LOAD Jul 2 07:57:00.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.803000 audit: BPF prog-id=59 op=LOAD Jul 2 07:57:00.803000 audit: BPF prog-id=47 op=UNLOAD Jul 2 07:57:00.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.804000 audit: BPF prog-id=60 op=LOAD Jul 2 07:57:00.804000 audit: BPF prog-id=35 op=UNLOAD Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit: BPF prog-id=61 op=LOAD Jul 2 07:57:00.807000 audit: BPF prog-id=36 op=UNLOAD Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit: BPF prog-id=62 op=LOAD Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:00.808000 audit: BPF prog-id=63 op=LOAD Jul 2 07:57:00.808000 audit: BPF prog-id=37 op=UNLOAD Jul 2 07:57:00.808000 audit: BPF prog-id=38 op=UNLOAD Jul 2 07:57:00.850914 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Jul 2 07:57:00.851042 systemd[1]: kubelet.service: Failed with result 'signal'. Jul 2 07:57:00.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 07:57:00.851744 systemd[1]: Stopped kubelet.service. Jul 2 07:57:00.854968 systemd[1]: Starting kubelet.service... Jul 2 07:57:01.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:01.238656 systemd[1]: Started kubelet.service. Jul 2 07:57:01.303143 kubelet[1800]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:57:01.303143 kubelet[1800]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:57:01.303143 kubelet[1800]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:57:01.303804 kubelet[1800]: I0702 07:57:01.303216 1800 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:57:01.998667 kubelet[1800]: I0702 07:57:01.998611 1800 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Jul 2 07:57:01.998667 kubelet[1800]: I0702 07:57:01.998647 1800 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:57:01.999017 kubelet[1800]: I0702 07:57:01.998983 1800 server.go:927] "Client rotation is on, will bootstrap in background" Jul 2 07:57:02.023377 kubelet[1800]: I0702 07:57:02.023340 1800 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:57:02.025470 kubelet[1800]: E0702 07:57:02.025443 1800 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.73:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.73:6443: connect: connection refused Jul 2 07:57:02.042124 kubelet[1800]: I0702 07:57:02.042092 1800 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:57:02.048911 kubelet[1800]: I0702 07:57:02.048851 1800 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:57:02.049716 kubelet[1800]: I0702 07:57:02.049262 1800 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:57:02.050025 kubelet[1800]: I0702 07:57:02.049981 1800 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:57:02.050025 kubelet[1800]: I0702 07:57:02.050011 1800 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:57:02.050242 kubelet[1800]: I0702 07:57:02.050210 1800 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:57:02.051799 kubelet[1800]: I0702 07:57:02.051707 1800 kubelet.go:400] "Attempting to sync node with API server" Jul 2 07:57:02.051799 kubelet[1800]: I0702 07:57:02.051774 1800 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:57:02.052000 kubelet[1800]: I0702 07:57:02.051852 1800 kubelet.go:312] "Adding apiserver pod source" Jul 2 07:57:02.052000 kubelet[1800]: I0702 07:57:02.051885 1800 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:57:02.066198 kubelet[1800]: W0702 07:57:02.066109 1800 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.128.0.73:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.73:6443: connect: connection refused Jul 2 07:57:02.066198 kubelet[1800]: E0702 07:57:02.066184 1800 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.73:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.73:6443: connect: connection refused Jul 2 07:57:02.071824 kubelet[1800]: W0702 07:57:02.071712 1800 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.128.0.73:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.73:6443: connect: connection refused Jul 2 07:57:02.072069 kubelet[1800]: E0702 07:57:02.072031 1800 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.73:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.73:6443: connect: connection refused Jul 2 07:57:02.072323 kubelet[1800]: I0702 07:57:02.072304 1800 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:57:02.074945 kubelet[1800]: I0702 07:57:02.074900 1800 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 07:57:02.075073 kubelet[1800]: W0702 07:57:02.074984 1800 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 07:57:02.076306 kubelet[1800]: I0702 07:57:02.075802 1800 server.go:1264] "Started kubelet" Jul 2 07:57:02.084307 kubelet[1800]: I0702 07:57:02.084259 1800 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:57:02.085710 kubelet[1800]: I0702 07:57:02.085662 1800 server.go:455] "Adding debug handlers to kubelet server" Jul 2 07:57:02.096102 kubelet[1800]: I0702 07:57:02.096011 1800 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 07:57:02.096411 kubelet[1800]: I0702 07:57:02.096372 1800 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:57:02.103205 kubelet[1800]: E0702 07:57:02.103053 1800 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.128.0.73:6443/api/v1/namespaces/default/events\": dial tcp 10.128.0.73:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal.17de5652f9869dab default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal,UID:ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal,},FirstTimestamp:2024-07-02 07:57:02.075764139 +0000 UTC m=+0.830450207,LastTimestamp:2024-07-02 07:57:02.075764139 +0000 UTC m=+0.830450207,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal,}" Jul 2 07:57:02.105000 audit[1800]: AVC avc: denied { mac_admin } for pid=1800 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.105000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:57:02.105000 audit[1800]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009622d0 a1=c00067f350 a2=c0009622a0 a3=25 items=0 ppid=1 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.105000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:57:02.106884 kubelet[1800]: I0702 07:57:02.106418 1800 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:57:02.107054 kubelet[1800]: I0702 07:57:02.107033 1800 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:57:02.107241 kubelet[1800]: I0702 07:57:02.107227 1800 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:57:02.106000 audit[1800]: AVC avc: denied { mac_admin } for pid=1800 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.106000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:57:02.106000 audit[1800]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007a1e40 a1=c00067f368 a2=c000962360 a3=25 items=0 ppid=1 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.106000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:57:02.112387 kubelet[1800]: E0702 07:57:02.112359 1800 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 07:57:02.112772 kubelet[1800]: E0702 07:57:02.112742 1800 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" not found" Jul 2 07:57:02.112967 kubelet[1800]: I0702 07:57:02.112948 1800 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:57:02.113225 kubelet[1800]: I0702 07:57:02.113206 1800 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Jul 2 07:57:02.113391 kubelet[1800]: I0702 07:57:02.113377 1800 reconciler.go:26] "Reconciler: start to sync state" Jul 2 07:57:02.114200 kubelet[1800]: W0702 07:57:02.114147 1800 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.128.0.73:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.73:6443: connect: connection refused Jul 2 07:57:02.114358 kubelet[1800]: E0702 07:57:02.114340 1800 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.73:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.73:6443: connect: connection refused Jul 2 07:57:02.114000 audit[1811]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:02.114000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffced0c95c0 a2=0 a3=7ffced0c95ac items=0 ppid=1800 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:57:02.115227 kubelet[1800]: E0702 07:57:02.115190 1800 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.73:6443: connect: connection refused" interval="200ms" Jul 2 07:57:02.115977 kubelet[1800]: I0702 07:57:02.115954 1800 factory.go:221] Registration of the systemd container factory successfully Jul 2 07:57:02.116241 kubelet[1800]: I0702 07:57:02.116217 1800 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 07:57:02.116000 audit[1812]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1812 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:02.116000 audit[1812]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc14820f20 a2=0 a3=7ffc14820f0c items=0 ppid=1800 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:57:02.118774 kubelet[1800]: I0702 07:57:02.118739 1800 factory.go:221] Registration of the containerd container factory successfully Jul 2 07:57:02.119000 audit[1814]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:02.119000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffffbcdef30 a2=0 a3=7ffffbcdef1c items=0 ppid=1800 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:57:02.123000 audit[1816]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:02.123000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffc1a1a6a0 a2=0 a3=7fffc1a1a68c items=0 ppid=1800 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:57:02.134000 audit[1819]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1819 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:02.134000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff10f623b0 a2=0 a3=7fff10f6239c items=0 ppid=1800 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 07:57:02.135004 kubelet[1800]: I0702 07:57:02.134900 1800 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:57:02.136000 audit[1820]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:02.136000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe85296eb0 a2=0 a3=7ffe85296e9c items=0 ppid=1800 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:57:02.136985 kubelet[1800]: I0702 07:57:02.136727 1800 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:57:02.136985 kubelet[1800]: I0702 07:57:02.136754 1800 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:57:02.136985 kubelet[1800]: I0702 07:57:02.136833 1800 kubelet.go:2337] "Starting kubelet main sync loop" Jul 2 07:57:02.136985 kubelet[1800]: E0702 07:57:02.136941 1800 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 07:57:02.138000 audit[1822]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1822 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:02.138000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcaeedb4c0 a2=0 a3=7ffcaeedb4ac items=0 ppid=1800 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.138000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:57:02.139000 audit[1823]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:02.139000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9263cb00 a2=0 a3=7ffc9263caec items=0 ppid=1800 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:57:02.141000 audit[1824]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:02.141000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe20f72c10 a2=0 a3=7ffe20f72bfc items=0 ppid=1800 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.141000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:57:02.142000 audit[1825]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:02.142000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc9d29ab0 a2=0 a3=7ffdc9d29a9c items=0 ppid=1800 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.142000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:57:02.144000 audit[1826]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:02.144000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff14d53bf0 a2=0 a3=7fff14d53bdc items=0 ppid=1800 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.144000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:57:02.153491 kubelet[1800]: W0702 07:57:02.153399 1800 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.128.0.73:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.73:6443: connect: connection refused Jul 2 07:57:02.153685 kubelet[1800]: E0702 07:57:02.153499 1800 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.73:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.73:6443: connect: connection refused Jul 2 07:57:02.154000 audit[1828]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:02.154000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc021e9f50 a2=0 a3=7ffc021e9f3c items=0 ppid=1800 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.154000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:57:02.157570 kubelet[1800]: I0702 07:57:02.157546 1800 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:57:02.157570 kubelet[1800]: I0702 07:57:02.157566 1800 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:57:02.157746 kubelet[1800]: I0702 07:57:02.157588 1800 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:57:02.160108 kubelet[1800]: I0702 07:57:02.160074 1800 policy_none.go:49] "None policy: Start" Jul 2 07:57:02.161029 kubelet[1800]: I0702 07:57:02.160964 1800 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 07:57:02.161167 kubelet[1800]: I0702 07:57:02.161034 1800 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:57:02.172247 systemd[1]: Created slice kubepods.slice. Jul 2 07:57:02.178804 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 07:57:02.182649 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 07:57:02.190802 kubelet[1800]: I0702 07:57:02.190758 1800 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:57:02.190000 audit[1800]: AVC avc: denied { mac_admin } for pid=1800 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:02.190000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:57:02.190000 audit[1800]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dfc0f0 a1=c000e940a8 a2=c000dfc0c0 a3=25 items=0 ppid=1 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:02.190000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:57:02.191344 kubelet[1800]: I0702 07:57:02.190847 1800 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:57:02.191344 kubelet[1800]: I0702 07:57:02.191007 1800 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 2 07:57:02.191344 kubelet[1800]: I0702 07:57:02.191186 1800 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:57:02.194667 kubelet[1800]: E0702 07:57:02.194336 1800 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" not found" Jul 2 07:57:02.220695 kubelet[1800]: I0702 07:57:02.220644 1800 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.221100 kubelet[1800]: E0702 07:57:02.221065 1800 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.73:6443/api/v1/nodes\": dial tcp 10.128.0.73:6443: connect: connection refused" node="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.237455 kubelet[1800]: I0702 07:57:02.237361 1800 topology_manager.go:215] "Topology Admit Handler" podUID="fb1677edf460fc19ae6efd9bd5f96946" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.242954 kubelet[1800]: I0702 07:57:02.242912 1800 topology_manager.go:215] "Topology Admit Handler" podUID="a995962a0d4f04a84dc9c657dd44b142" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.249098 kubelet[1800]: I0702 07:57:02.248730 1800 topology_manager.go:215] "Topology Admit Handler" podUID="9f6f60056459eac36df4a39cacf90696" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.257312 systemd[1]: Created slice kubepods-burstable-podfb1677edf460fc19ae6efd9bd5f96946.slice. Jul 2 07:57:02.268725 systemd[1]: Created slice kubepods-burstable-poda995962a0d4f04a84dc9c657dd44b142.slice. Jul 2 07:57:02.275795 systemd[1]: Created slice kubepods-burstable-pod9f6f60056459eac36df4a39cacf90696.slice. Jul 2 07:57:02.316339 kubelet[1800]: E0702 07:57:02.316261 1800 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.73:6443: connect: connection refused" interval="400ms" Jul 2 07:57:02.416024 kubelet[1800]: I0702 07:57:02.415948 1800 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a995962a0d4f04a84dc9c657dd44b142-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"a995962a0d4f04a84dc9c657dd44b142\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.416024 kubelet[1800]: I0702 07:57:02.416013 1800 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a995962a0d4f04a84dc9c657dd44b142-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"a995962a0d4f04a84dc9c657dd44b142\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.416415 kubelet[1800]: I0702 07:57:02.416048 1800 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9f6f60056459eac36df4a39cacf90696-kubeconfig\") pod \"kube-scheduler-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"9f6f60056459eac36df4a39cacf90696\") " pod="kube-system/kube-scheduler-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.416415 kubelet[1800]: I0702 07:57:02.416077 1800 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/fb1677edf460fc19ae6efd9bd5f96946-k8s-certs\") pod \"kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"fb1677edf460fc19ae6efd9bd5f96946\") " pod="kube-system/kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.416415 kubelet[1800]: I0702 07:57:02.416105 1800 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/fb1677edf460fc19ae6efd9bd5f96946-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"fb1677edf460fc19ae6efd9bd5f96946\") " pod="kube-system/kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.416415 kubelet[1800]: I0702 07:57:02.416131 1800 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a995962a0d4f04a84dc9c657dd44b142-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"a995962a0d4f04a84dc9c657dd44b142\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.416609 kubelet[1800]: I0702 07:57:02.416158 1800 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a995962a0d4f04a84dc9c657dd44b142-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"a995962a0d4f04a84dc9c657dd44b142\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.416609 kubelet[1800]: I0702 07:57:02.416190 1800 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/fb1677edf460fc19ae6efd9bd5f96946-ca-certs\") pod \"kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"fb1677edf460fc19ae6efd9bd5f96946\") " pod="kube-system/kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.416609 kubelet[1800]: I0702 07:57:02.416216 1800 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a995962a0d4f04a84dc9c657dd44b142-ca-certs\") pod \"kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"a995962a0d4f04a84dc9c657dd44b142\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.426676 kubelet[1800]: I0702 07:57:02.426642 1800 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.427140 kubelet[1800]: E0702 07:57:02.427092 1800 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.73:6443/api/v1/nodes\": dial tcp 10.128.0.73:6443: connect: connection refused" node="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.566639 env[1237]: time="2024-07-02T07:57:02.566416726Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal,Uid:fb1677edf460fc19ae6efd9bd5f96946,Namespace:kube-system,Attempt:0,}" Jul 2 07:57:02.574654 env[1237]: time="2024-07-02T07:57:02.574582310Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal,Uid:a995962a0d4f04a84dc9c657dd44b142,Namespace:kube-system,Attempt:0,}" Jul 2 07:57:02.580909 env[1237]: time="2024-07-02T07:57:02.580829412Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal,Uid:9f6f60056459eac36df4a39cacf90696,Namespace:kube-system,Attempt:0,}" Jul 2 07:57:02.717254 kubelet[1800]: E0702 07:57:02.717162 1800 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.73:6443: connect: connection refused" interval="800ms" Jul 2 07:57:02.833155 kubelet[1800]: I0702 07:57:02.832629 1800 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.833369 kubelet[1800]: E0702 07:57:02.833311 1800 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.73:6443/api/v1/nodes\": dial tcp 10.128.0.73:6443: connect: connection refused" node="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:02.937305 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount157746474.mount: Deactivated successfully. Jul 2 07:57:02.945551 env[1237]: time="2024-07-02T07:57:02.945473275Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:02.947455 env[1237]: time="2024-07-02T07:57:02.947370729Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:02.951486 env[1237]: time="2024-07-02T07:57:02.951402737Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:02.953423 env[1237]: time="2024-07-02T07:57:02.953370190Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:02.954820 env[1237]: time="2024-07-02T07:57:02.954761031Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:02.957280 env[1237]: time="2024-07-02T07:57:02.957230197Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:02.966564 env[1237]: time="2024-07-02T07:57:02.966478033Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:02.968739 env[1237]: time="2024-07-02T07:57:02.968670362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:02.969697 env[1237]: time="2024-07-02T07:57:02.969647293Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:02.973209 env[1237]: time="2024-07-02T07:57:02.973148910Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:02.974784 env[1237]: time="2024-07-02T07:57:02.974739247Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:02.978225 env[1237]: time="2024-07-02T07:57:02.978141815Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:03.017034 env[1237]: time="2024-07-02T07:57:03.010378068Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:03.017034 env[1237]: time="2024-07-02T07:57:03.010482179Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:03.017034 env[1237]: time="2024-07-02T07:57:03.010505311Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:03.017034 env[1237]: time="2024-07-02T07:57:03.010770788Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f510c3ecfa8bc23e4b23d8ff6e2c7eaade958692db38b987bf0784cb9704c2e pid=1838 runtime=io.containerd.runc.v2 Jul 2 07:57:03.056206 env[1237]: time="2024-07-02T07:57:03.055612180Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:03.056206 env[1237]: time="2024-07-02T07:57:03.055831173Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:03.056206 env[1237]: time="2024-07-02T07:57:03.055926626Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:03.056767 env[1237]: time="2024-07-02T07:57:03.056668927Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8adaa32d7c6ef097a6769470d2e0aeb8c6a1491c18202f144b78fe4577b6a4d9 pid=1861 runtime=io.containerd.runc.v2 Jul 2 07:57:03.067530 env[1237]: time="2024-07-02T07:57:03.067355132Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:03.067978 env[1237]: time="2024-07-02T07:57:03.067891750Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:03.068285 env[1237]: time="2024-07-02T07:57:03.068178416Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:03.069003 env[1237]: time="2024-07-02T07:57:03.068954113Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/faf3ad3569ee98bb54ddebf7ac8ee1a5050118c404c4c477257b4e380604c4ee pid=1877 runtime=io.containerd.runc.v2 Jul 2 07:57:03.093809 systemd[1]: Started cri-containerd-8f510c3ecfa8bc23e4b23d8ff6e2c7eaade958692db38b987bf0784cb9704c2e.scope. Jul 2 07:57:03.100215 systemd[1]: Started cri-containerd-8adaa32d7c6ef097a6769470d2e0aeb8c6a1491c18202f144b78fe4577b6a4d9.scope. Jul 2 07:57:03.133657 systemd[1]: Started cri-containerd-faf3ad3569ee98bb54ddebf7ac8ee1a5050118c404c4c477257b4e380604c4ee.scope. Jul 2 07:57:03.151865 kubelet[1800]: W0702 07:57:03.151738 1800 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.128.0.73:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.73:6443: connect: connection refused Jul 2 07:57:03.152131 kubelet[1800]: E0702 07:57:03.151889 1800 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.73:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.73:6443: connect: connection refused Jul 2 07:57:03.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.165000 audit: BPF prog-id=64 op=LOAD Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1838 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866353130633365636661386263323365346232336438666636653263 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1838 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866353130633365636661386263323365346232336438666636653263 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit: BPF prog-id=65 op=LOAD Jul 2 07:57:03.166000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003d29d0 items=0 ppid=1838 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866353130633365636661386263323365346232336438666636653263 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit: BPF prog-id=66 op=LOAD Jul 2 07:57:03.166000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003d2a18 items=0 ppid=1838 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866353130633365636661386263323365346232336438666636653263 Jul 2 07:57:03.166000 audit: BPF prog-id=66 op=UNLOAD Jul 2 07:57:03.166000 audit: BPF prog-id=65 op=UNLOAD Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.166000 audit: BPF prog-id=67 op=LOAD Jul 2 07:57:03.166000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003d2e28 items=0 ppid=1838 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866353130633365636661386263323365346232336438666636653263 Jul 2 07:57:03.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.181000 audit: BPF prog-id=68 op=LOAD Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1861 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861646161333264376336656630393761363736393437306432653061 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1861 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861646161333264376336656630393761363736393437306432653061 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit: BPF prog-id=69 op=LOAD Jul 2 07:57:03.182000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c7440 items=0 ppid=1861 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861646161333264376336656630393761363736393437306432653061 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit: BPF prog-id=70 op=LOAD Jul 2 07:57:03.182000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c7488 items=0 ppid=1861 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861646161333264376336656630393761363736393437306432653061 Jul 2 07:57:03.182000 audit: BPF prog-id=70 op=UNLOAD Jul 2 07:57:03.182000 audit: BPF prog-id=69 op=UNLOAD Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.182000 audit: BPF prog-id=71 op=LOAD Jul 2 07:57:03.182000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c7898 items=0 ppid=1861 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861646161333264376336656630393761363736393437306432653061 Jul 2 07:57:03.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.192000 audit: BPF prog-id=72 op=LOAD Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1877 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661663361643335363965653938626235346464656266376163386565 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1877 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661663361643335363965653938626235346464656266376163386565 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit: BPF prog-id=73 op=LOAD Jul 2 07:57:03.193000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00040a3c0 items=0 ppid=1877 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661663361643335363965653938626235346464656266376163386565 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.193000 audit: BPF prog-id=74 op=LOAD Jul 2 07:57:03.193000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00040a408 items=0 ppid=1877 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661663361643335363965653938626235346464656266376163386565 Jul 2 07:57:03.193000 audit: BPF prog-id=74 op=UNLOAD Jul 2 07:57:03.193000 audit: BPF prog-id=73 op=UNLOAD Jul 2 07:57:03.194000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.194000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.194000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.194000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.194000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.194000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.194000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.194000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.194000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.194000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.194000 audit: BPF prog-id=75 op=LOAD Jul 2 07:57:03.194000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00040a818 items=0 ppid=1877 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661663361643335363965653938626235346464656266376163386565 Jul 2 07:57:03.256090 env[1237]: time="2024-07-02T07:57:03.255947750Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal,Uid:fb1677edf460fc19ae6efd9bd5f96946,Namespace:kube-system,Attempt:0,} returns sandbox id \"8f510c3ecfa8bc23e4b23d8ff6e2c7eaade958692db38b987bf0784cb9704c2e\"" Jul 2 07:57:03.267822 kubelet[1800]: E0702 07:57:03.267762 1800 kubelet_pods.go:513] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-21291" Jul 2 07:57:03.272227 env[1237]: time="2024-07-02T07:57:03.271480899Z" level=info msg="CreateContainer within sandbox \"8f510c3ecfa8bc23e4b23d8ff6e2c7eaade958692db38b987bf0784cb9704c2e\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 2 07:57:03.295793 env[1237]: time="2024-07-02T07:57:03.295709613Z" level=info msg="CreateContainer within sandbox \"8f510c3ecfa8bc23e4b23d8ff6e2c7eaade958692db38b987bf0784cb9704c2e\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"c02b0cf21e6f6cc384016b2d537a7c85a539bc99817a186c82c93502c5ea2864\"" Jul 2 07:57:03.297638 env[1237]: time="2024-07-02T07:57:03.297139162Z" level=info msg="StartContainer for \"c02b0cf21e6f6cc384016b2d537a7c85a539bc99817a186c82c93502c5ea2864\"" Jul 2 07:57:03.299792 env[1237]: time="2024-07-02T07:57:03.299737480Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal,Uid:9f6f60056459eac36df4a39cacf90696,Namespace:kube-system,Attempt:0,} returns sandbox id \"8adaa32d7c6ef097a6769470d2e0aeb8c6a1491c18202f144b78fe4577b6a4d9\"" Jul 2 07:57:03.302215 kubelet[1800]: E0702 07:57:03.302125 1800 kubelet_pods.go:513] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-21291" Jul 2 07:57:03.304885 env[1237]: time="2024-07-02T07:57:03.304822297Z" level=info msg="CreateContainer within sandbox \"8adaa32d7c6ef097a6769470d2e0aeb8c6a1491c18202f144b78fe4577b6a4d9\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 2 07:57:03.316717 env[1237]: time="2024-07-02T07:57:03.316638487Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal,Uid:a995962a0d4f04a84dc9c657dd44b142,Namespace:kube-system,Attempt:0,} returns sandbox id \"faf3ad3569ee98bb54ddebf7ac8ee1a5050118c404c4c477257b4e380604c4ee\"" Jul 2 07:57:03.320011 kubelet[1800]: E0702 07:57:03.319947 1800 kubelet_pods.go:513] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flat" Jul 2 07:57:03.322906 env[1237]: time="2024-07-02T07:57:03.322840220Z" level=info msg="CreateContainer within sandbox \"faf3ad3569ee98bb54ddebf7ac8ee1a5050118c404c4c477257b4e380604c4ee\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 2 07:57:03.343955 systemd[1]: Started cri-containerd-c02b0cf21e6f6cc384016b2d537a7c85a539bc99817a186c82c93502c5ea2864.scope. Jul 2 07:57:03.368929 env[1237]: time="2024-07-02T07:57:03.368718521Z" level=info msg="CreateContainer within sandbox \"8adaa32d7c6ef097a6769470d2e0aeb8c6a1491c18202f144b78fe4577b6a4d9\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"a8e7a02785b264455dd5bf60bcc26d4f77b914389f6a8e15707aa8d36d6f7a7f\"" Jul 2 07:57:03.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.375000 audit: BPF prog-id=76 op=LOAD Jul 2 07:57:03.377000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.377000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1838 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330326230636632316536663663633338343031366232643533376137 Jul 2 07:57:03.378000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.378000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1838 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330326230636632316536663663633338343031366232643533376137 Jul 2 07:57:03.378000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.378000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.378000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.378000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.378000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.378000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.378000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.378000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.378000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.378000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.378000 audit: BPF prog-id=77 op=LOAD Jul 2 07:57:03.378000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000252b0 items=0 ppid=1838 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330326230636632316536663663633338343031366232643533376137 Jul 2 07:57:03.379000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.379000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.379000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.379000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.379000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.379000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.379000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.379000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.381921 env[1237]: time="2024-07-02T07:57:03.381767300Z" level=info msg="StartContainer for \"a8e7a02785b264455dd5bf60bcc26d4f77b914389f6a8e15707aa8d36d6f7a7f\"" Jul 2 07:57:03.379000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.379000 audit: BPF prog-id=78 op=LOAD Jul 2 07:57:03.379000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000252f8 items=0 ppid=1838 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330326230636632316536663663633338343031366232643533376137 Jul 2 07:57:03.381000 audit: BPF prog-id=78 op=UNLOAD Jul 2 07:57:03.381000 audit: BPF prog-id=77 op=UNLOAD Jul 2 07:57:03.381000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.381000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.381000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.381000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.381000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.381000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.381000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.381000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.381000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.381000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.381000 audit: BPF prog-id=79 op=LOAD Jul 2 07:57:03.381000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025708 items=0 ppid=1838 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330326230636632316536663663633338343031366232643533376137 Jul 2 07:57:03.409470 env[1237]: time="2024-07-02T07:57:03.403600012Z" level=info msg="CreateContainer within sandbox \"faf3ad3569ee98bb54ddebf7ac8ee1a5050118c404c4c477257b4e380604c4ee\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"91287981d5521235759deef7280244b5e1410bce9e0cc8abf73c5a6544832553\"" Jul 2 07:57:03.409470 env[1237]: time="2024-07-02T07:57:03.404732140Z" level=info msg="StartContainer for \"91287981d5521235759deef7280244b5e1410bce9e0cc8abf73c5a6544832553\"" Jul 2 07:57:03.427873 kubelet[1800]: W0702 07:57:03.427719 1800 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.128.0.73:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.73:6443: connect: connection refused Jul 2 07:57:03.428099 kubelet[1800]: E0702 07:57:03.427903 1800 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.73:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.73:6443: connect: connection refused Jul 2 07:57:03.457263 systemd[1]: Started cri-containerd-91287981d5521235759deef7280244b5e1410bce9e0cc8abf73c5a6544832553.scope. Jul 2 07:57:03.461795 systemd[1]: Started cri-containerd-a8e7a02785b264455dd5bf60bcc26d4f77b914389f6a8e15707aa8d36d6f7a7f.scope. Jul 2 07:57:03.502520 env[1237]: time="2024-07-02T07:57:03.502449089Z" level=info msg="StartContainer for \"c02b0cf21e6f6cc384016b2d537a7c85a539bc99817a186c82c93502c5ea2864\" returns successfully" Jul 2 07:57:03.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.512000 audit: BPF prog-id=80 op=LOAD Jul 2 07:57:03.514000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.514000 audit[2007]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1861 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653761303237383562323634343535646435626636306263633236 Jul 2 07:57:03.514000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.514000 audit[2007]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1861 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653761303237383562323634343535646435626636306263633236 Jul 2 07:57:03.515000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.515000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.515000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.515000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.515000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.515000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.515000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.515000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.515000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.518528 kubelet[1800]: E0702 07:57:03.518386 1800 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.73:6443: connect: connection refused" interval="1.6s" Jul 2 07:57:03.515000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.515000 audit: BPF prog-id=81 op=LOAD Jul 2 07:57:03.515000 audit[2007]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000257c0 items=0 ppid=1861 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653761303237383562323634343535646435626636306263633236 Jul 2 07:57:03.517000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.517000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.517000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.517000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.517000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.517000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.517000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.517000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.517000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.517000 audit: BPF prog-id=82 op=LOAD Jul 2 07:57:03.517000 audit[2007]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025808 items=0 ppid=1861 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653761303237383562323634343535646435626636306263633236 Jul 2 07:57:03.519000 audit: BPF prog-id=82 op=UNLOAD Jul 2 07:57:03.519000 audit: BPF prog-id=81 op=UNLOAD Jul 2 07:57:03.519000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.519000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.519000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.519000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.519000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.519000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.519000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.519000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.519000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.519000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.519000 audit: BPF prog-id=83 op=LOAD Jul 2 07:57:03.519000 audit[2007]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025c18 items=0 ppid=1861 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653761303237383562323634343535646435626636306263633236 Jul 2 07:57:03.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.528000 audit: BPF prog-id=84 op=LOAD Jul 2 07:57:03.530000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.530000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1877 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323837393831643535323132333537353964656566373238303234 Jul 2 07:57:03.530000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.530000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1877 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323837393831643535323132333537353964656566373238303234 Jul 2 07:57:03.531000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.531000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.531000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.531000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.531000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.531000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.531000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.531000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.531000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.531000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.531000 audit: BPF prog-id=85 op=LOAD Jul 2 07:57:03.531000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000389600 items=0 ppid=1877 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323837393831643535323132333537353964656566373238303234 Jul 2 07:57:03.532000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.532000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.532000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.532000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.532000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.532000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.532000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.532000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.532000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.532000 audit: BPF prog-id=86 op=LOAD Jul 2 07:57:03.532000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000389648 items=0 ppid=1877 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323837393831643535323132333537353964656566373238303234 Jul 2 07:57:03.533000 audit: BPF prog-id=86 op=UNLOAD Jul 2 07:57:03.533000 audit: BPF prog-id=85 op=UNLOAD Jul 2 07:57:03.533000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.533000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.533000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.533000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.533000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.533000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.533000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.533000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.533000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.533000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:03.533000 audit: BPF prog-id=87 op=LOAD Jul 2 07:57:03.533000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000389a58 items=0 ppid=1877 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323837393831643535323132333537353964656566373238303234 Jul 2 07:57:03.587729 kubelet[1800]: W0702 07:57:03.587564 1800 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.128.0.73:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.73:6443: connect: connection refused Jul 2 07:57:03.587729 kubelet[1800]: E0702 07:57:03.587693 1800 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.73:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.73:6443: connect: connection refused Jul 2 07:57:03.604925 env[1237]: time="2024-07-02T07:57:03.604771849Z" level=info msg="StartContainer for \"a8e7a02785b264455dd5bf60bcc26d4f77b914389f6a8e15707aa8d36d6f7a7f\" returns successfully" Jul 2 07:57:03.625553 env[1237]: time="2024-07-02T07:57:03.625378668Z" level=info msg="StartContainer for \"91287981d5521235759deef7280244b5e1410bce9e0cc8abf73c5a6544832553\" returns successfully" Jul 2 07:57:03.629859 kubelet[1800]: W0702 07:57:03.629745 1800 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.128.0.73:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.73:6443: connect: connection refused Jul 2 07:57:03.629859 kubelet[1800]: E0702 07:57:03.629830 1800 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.73:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.73:6443: connect: connection refused Jul 2 07:57:03.638799 kubelet[1800]: I0702 07:57:03.638761 1800 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:03.639354 kubelet[1800]: E0702 07:57:03.639297 1800 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.73:6443/api/v1/nodes\": dial tcp 10.128.0.73:6443: connect: connection refused" node="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:05.244801 kubelet[1800]: I0702 07:57:05.244755 1800 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:06.191000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:06.197263 kernel: kauditd_printk_skb: 644 callbacks suppressed Jul 2 07:57:06.197426 kernel: audit: type=1400 audit(1719907026.191:507): avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:06.191000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0061d8360 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:57:06.279472 kernel: audit: type=1300 audit(1719907026.191:507): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0061d8360 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:57:06.191000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:57:06.196000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:06.335646 kernel: audit: type=1327 audit(1719907026.191:507): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:57:06.335809 kernel: audit: type=1400 audit(1719907026.196:508): avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:06.196000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c0047a4940 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:57:06.370068 kernel: audit: type=1300 audit(1719907026.196:508): arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c0047a4940 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:57:06.196000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:57:06.196000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:06.427814 kernel: audit: type=1327 audit(1719907026.196:508): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:57:06.427977 kernel: audit: type=1400 audit(1719907026.196:509): avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:06.196000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c0061d8510 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:57:06.196000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:57:06.493819 kernel: audit: type=1300 audit(1719907026.196:509): arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c0061d8510 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:57:06.494008 kernel: audit: type=1327 audit(1719907026.196:509): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:57:06.226000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:06.523393 kernel: audit: type=1400 audit(1719907026.226:510): avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:06.226000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c0041975f0 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:57:06.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:57:06.233000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:06.233000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00748c3c0 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:57:06.233000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:57:06.234000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:06.234000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0045ed710 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:57:06.234000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:57:06.684541 kubelet[1800]: E0702 07:57:06.684468 1800 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" not found" node="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:06.776586 kubelet[1800]: I0702 07:57:06.776424 1800 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:07.069133 kubelet[1800]: I0702 07:57:07.069017 1800 apiserver.go:52] "Watching apiserver" Jul 2 07:57:07.114481 kubelet[1800]: I0702 07:57:07.114380 1800 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Jul 2 07:57:07.357000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:07.357000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000afa5d0 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:57:07.357000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:07.358000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:07.358000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009a4100 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:57:07.358000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:08.711084 systemd[1]: Reloading. Jul 2 07:57:08.788529 update_engine[1224]: I0702 07:57:08.787521 1224 update_attempter.cc:509] Updating boot flags... Jul 2 07:57:08.874267 /usr/lib/systemd/system-generators/torcx-generator[2104]: time="2024-07-02T07:57:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:57:08.874322 /usr/lib/systemd/system-generators/torcx-generator[2104]: time="2024-07-02T07:57:08Z" level=info msg="torcx already run" Jul 2 07:57:09.095509 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:57:09.095545 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:57:09.128540 kubelet[1800]: W0702 07:57:09.128475 1800 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Jul 2 07:57:09.132179 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:57:09.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.248000 audit: BPF prog-id=88 op=LOAD Jul 2 07:57:09.248000 audit: BPF prog-id=49 op=UNLOAD Jul 2 07:57:09.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.252000 audit: BPF prog-id=89 op=LOAD Jul 2 07:57:09.252000 audit: BPF prog-id=50 op=UNLOAD Jul 2 07:57:09.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.259000 audit: BPF prog-id=90 op=LOAD Jul 2 07:57:09.259000 audit: BPF prog-id=51 op=UNLOAD Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit: BPF prog-id=91 op=LOAD Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.260000 audit: BPF prog-id=92 op=LOAD Jul 2 07:57:09.260000 audit: BPF prog-id=52 op=UNLOAD Jul 2 07:57:09.260000 audit: BPF prog-id=53 op=UNLOAD Jul 2 07:57:09.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.262000 audit: BPF prog-id=93 op=LOAD Jul 2 07:57:09.262000 audit: BPF prog-id=76 op=UNLOAD Jul 2 07:57:09.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.264000 audit: BPF prog-id=94 op=LOAD Jul 2 07:57:09.264000 audit: BPF prog-id=84 op=UNLOAD Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit: BPF prog-id=95 op=LOAD Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.265000 audit: BPF prog-id=96 op=LOAD Jul 2 07:57:09.265000 audit: BPF prog-id=54 op=UNLOAD Jul 2 07:57:09.265000 audit: BPF prog-id=55 op=UNLOAD Jul 2 07:57:09.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.266000 audit: BPF prog-id=97 op=LOAD Jul 2 07:57:09.266000 audit: BPF prog-id=56 op=UNLOAD Jul 2 07:57:09.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.267000 audit: BPF prog-id=98 op=LOAD Jul 2 07:57:09.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.267000 audit: BPF prog-id=99 op=LOAD Jul 2 07:57:09.267000 audit: BPF prog-id=57 op=UNLOAD Jul 2 07:57:09.267000 audit: BPF prog-id=58 op=UNLOAD Jul 2 07:57:09.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.269000 audit: BPF prog-id=100 op=LOAD Jul 2 07:57:09.269000 audit: BPF prog-id=59 op=UNLOAD Jul 2 07:57:09.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.270000 audit: BPF prog-id=101 op=LOAD Jul 2 07:57:09.270000 audit: BPF prog-id=60 op=UNLOAD Jul 2 07:57:09.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.272000 audit: BPF prog-id=102 op=LOAD Jul 2 07:57:09.272000 audit: BPF prog-id=64 op=UNLOAD Jul 2 07:57:09.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.275000 audit: BPF prog-id=103 op=LOAD Jul 2 07:57:09.275000 audit: BPF prog-id=68 op=UNLOAD Jul 2 07:57:09.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit: BPF prog-id=104 op=LOAD Jul 2 07:57:09.278000 audit: BPF prog-id=61 op=UNLOAD Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit: BPF prog-id=105 op=LOAD Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.278000 audit: BPF prog-id=106 op=LOAD Jul 2 07:57:09.278000 audit: BPF prog-id=62 op=UNLOAD Jul 2 07:57:09.278000 audit: BPF prog-id=63 op=UNLOAD Jul 2 07:57:09.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.281000 audit: BPF prog-id=107 op=LOAD Jul 2 07:57:09.281000 audit: BPF prog-id=80 op=UNLOAD Jul 2 07:57:09.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.282000 audit: BPF prog-id=108 op=LOAD Jul 2 07:57:09.282000 audit: BPF prog-id=72 op=UNLOAD Jul 2 07:57:09.356682 kubelet[1800]: E0702 07:57:09.347354 1800 event.go:319] "Unable to write event (broadcaster is shut down)" event="&Event{ObjectMeta:{ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal.17de5652f9869dab default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal,UID:ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal,},FirstTimestamp:2024-07-02 07:57:02.075764139 +0000 UTC m=+0.830450207,LastTimestamp:2024-07-02 07:57:02.075764139 +0000 UTC m=+0.830450207,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal,}" Jul 2 07:57:09.352163 systemd[1]: Stopping kubelet.service... Jul 2 07:57:09.376795 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 07:57:09.377150 systemd[1]: Stopped kubelet.service. Jul 2 07:57:09.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:09.377277 systemd[1]: kubelet.service: Consumed 1.286s CPU time. Jul 2 07:57:09.380538 systemd[1]: Starting kubelet.service... Jul 2 07:57:09.604678 systemd[1]: Started kubelet.service. Jul 2 07:57:09.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:09.709382 kubelet[2162]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:57:09.710647 kubelet[2162]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:57:09.710762 kubelet[2162]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:57:09.711023 kubelet[2162]: I0702 07:57:09.710980 2162 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:57:09.719693 kubelet[2162]: I0702 07:57:09.719659 2162 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Jul 2 07:57:09.719879 kubelet[2162]: I0702 07:57:09.719865 2162 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:57:09.720283 kubelet[2162]: I0702 07:57:09.720266 2162 server.go:927] "Client rotation is on, will bootstrap in background" Jul 2 07:57:09.728729 kubelet[2162]: I0702 07:57:09.728686 2162 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 2 07:57:09.731944 kubelet[2162]: I0702 07:57:09.731908 2162 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:57:09.745742 kubelet[2162]: I0702 07:57:09.745684 2162 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:57:09.746071 kubelet[2162]: I0702 07:57:09.746013 2162 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:57:09.746305 kubelet[2162]: I0702 07:57:09.746058 2162 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:57:09.748146 kubelet[2162]: I0702 07:57:09.746344 2162 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:57:09.748146 kubelet[2162]: I0702 07:57:09.746365 2162 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:57:09.748146 kubelet[2162]: I0702 07:57:09.746499 2162 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:57:09.748146 kubelet[2162]: I0702 07:57:09.746661 2162 kubelet.go:400] "Attempting to sync node with API server" Jul 2 07:57:09.748146 kubelet[2162]: I0702 07:57:09.746685 2162 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:57:09.748146 kubelet[2162]: I0702 07:57:09.746724 2162 kubelet.go:312] "Adding apiserver pod source" Jul 2 07:57:09.748146 kubelet[2162]: I0702 07:57:09.746761 2162 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:57:09.748727 kubelet[2162]: I0702 07:57:09.748413 2162 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:57:09.748956 kubelet[2162]: I0702 07:57:09.748914 2162 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 07:57:09.749856 kubelet[2162]: I0702 07:57:09.749801 2162 server.go:1264] "Started kubelet" Jul 2 07:57:09.764000 audit[2162]: AVC avc: denied { mac_admin } for pid=2162 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.764000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:57:09.764000 audit[2162]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b48690 a1=c000a14990 a2=c000b48660 a3=25 items=0 ppid=1 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:09.764000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:57:09.767984 kubelet[2162]: I0702 07:57:09.767948 2162 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:57:09.768182 kubelet[2162]: I0702 07:57:09.768159 2162 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:57:09.766000 audit[2162]: AVC avc: denied { mac_admin } for pid=2162 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.766000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:57:09.766000 audit[2162]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008e43a0 a1=c000a149a8 a2=c000b48720 a3=25 items=0 ppid=1 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:09.766000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:57:09.768671 kubelet[2162]: I0702 07:57:09.768650 2162 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:57:09.773153 kubelet[2162]: I0702 07:57:09.772968 2162 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:57:09.775579 kubelet[2162]: I0702 07:57:09.774650 2162 server.go:455] "Adding debug handlers to kubelet server" Jul 2 07:57:09.776196 kubelet[2162]: I0702 07:57:09.776129 2162 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 07:57:09.777937 kubelet[2162]: I0702 07:57:09.776566 2162 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:57:09.780530 kubelet[2162]: I0702 07:57:09.778970 2162 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:57:09.780530 kubelet[2162]: I0702 07:57:09.779447 2162 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Jul 2 07:57:09.780530 kubelet[2162]: I0702 07:57:09.779646 2162 reconciler.go:26] "Reconciler: start to sync state" Jul 2 07:57:09.788335 kubelet[2162]: I0702 07:57:09.788309 2162 factory.go:221] Registration of the systemd container factory successfully Jul 2 07:57:09.791589 kubelet[2162]: I0702 07:57:09.791557 2162 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 07:57:09.804389 kubelet[2162]: I0702 07:57:09.804261 2162 factory.go:221] Registration of the containerd container factory successfully Jul 2 07:57:09.835188 kubelet[2162]: E0702 07:57:09.835153 2162 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 07:57:09.859748 kubelet[2162]: I0702 07:57:09.859675 2162 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:57:09.866426 kubelet[2162]: I0702 07:57:09.865230 2162 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:57:09.866426 kubelet[2162]: I0702 07:57:09.865270 2162 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:57:09.866426 kubelet[2162]: I0702 07:57:09.865293 2162 kubelet.go:2337] "Starting kubelet main sync loop" Jul 2 07:57:09.866426 kubelet[2162]: E0702 07:57:09.865352 2162 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 07:57:09.890579 kubelet[2162]: I0702 07:57:09.890520 2162 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:09.901708 kubelet[2162]: I0702 07:57:09.901675 2162 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:09.902015 kubelet[2162]: I0702 07:57:09.901995 2162 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:09.933085 kubelet[2162]: I0702 07:57:09.932895 2162 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:57:09.933085 kubelet[2162]: I0702 07:57:09.932919 2162 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:57:09.933085 kubelet[2162]: I0702 07:57:09.932945 2162 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:57:09.933391 kubelet[2162]: I0702 07:57:09.933327 2162 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 2 07:57:09.933391 kubelet[2162]: I0702 07:57:09.933346 2162 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 2 07:57:09.933391 kubelet[2162]: I0702 07:57:09.933379 2162 policy_none.go:49] "None policy: Start" Jul 2 07:57:09.935041 kubelet[2162]: I0702 07:57:09.935002 2162 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 07:57:09.935041 kubelet[2162]: I0702 07:57:09.935031 2162 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:57:09.936572 kubelet[2162]: I0702 07:57:09.935385 2162 state_mem.go:75] "Updated machine memory state" Jul 2 07:57:09.940000 audit[2162]: AVC avc: denied { mac_admin } for pid=2162 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:09.940000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:57:09.940000 audit[2162]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ca8e70 a1=c000fe0c48 a2=c000ca8e40 a3=25 items=0 ppid=1 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:09.940000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:57:09.943103 kubelet[2162]: I0702 07:57:09.941940 2162 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:57:09.943103 kubelet[2162]: I0702 07:57:09.942071 2162 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:57:09.943103 kubelet[2162]: I0702 07:57:09.942277 2162 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 2 07:57:09.944000 kubelet[2162]: I0702 07:57:09.943980 2162 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:57:09.973154 kubelet[2162]: I0702 07:57:09.968871 2162 topology_manager.go:215] "Topology Admit Handler" podUID="fb1677edf460fc19ae6efd9bd5f96946" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:09.974676 kubelet[2162]: I0702 07:57:09.974640 2162 topology_manager.go:215] "Topology Admit Handler" podUID="a995962a0d4f04a84dc9c657dd44b142" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:09.974807 kubelet[2162]: I0702 07:57:09.974772 2162 topology_manager.go:215] "Topology Admit Handler" podUID="9f6f60056459eac36df4a39cacf90696" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:09.980855 kubelet[2162]: W0702 07:57:09.980827 2162 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Jul 2 07:57:09.985366 kubelet[2162]: I0702 07:57:09.985327 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a995962a0d4f04a84dc9c657dd44b142-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"a995962a0d4f04a84dc9c657dd44b142\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:09.985633 kubelet[2162]: I0702 07:57:09.985603 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a995962a0d4f04a84dc9c657dd44b142-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"a995962a0d4f04a84dc9c657dd44b142\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:09.985810 kubelet[2162]: I0702 07:57:09.985782 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/fb1677edf460fc19ae6efd9bd5f96946-ca-certs\") pod \"kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"fb1677edf460fc19ae6efd9bd5f96946\") " pod="kube-system/kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:09.986992 kubelet[2162]: I0702 07:57:09.985937 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/fb1677edf460fc19ae6efd9bd5f96946-k8s-certs\") pod \"kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"fb1677edf460fc19ae6efd9bd5f96946\") " pod="kube-system/kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:09.986992 kubelet[2162]: I0702 07:57:09.986510 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a995962a0d4f04a84dc9c657dd44b142-ca-certs\") pod \"kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"a995962a0d4f04a84dc9c657dd44b142\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:09.986992 kubelet[2162]: I0702 07:57:09.986552 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9f6f60056459eac36df4a39cacf90696-kubeconfig\") pod \"kube-scheduler-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"9f6f60056459eac36df4a39cacf90696\") " pod="kube-system/kube-scheduler-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:09.986992 kubelet[2162]: I0702 07:57:09.986588 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/fb1677edf460fc19ae6efd9bd5f96946-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"fb1677edf460fc19ae6efd9bd5f96946\") " pod="kube-system/kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:09.987247 kubelet[2162]: I0702 07:57:09.986622 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a995962a0d4f04a84dc9c657dd44b142-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"a995962a0d4f04a84dc9c657dd44b142\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:09.987247 kubelet[2162]: I0702 07:57:09.986662 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a995962a0d4f04a84dc9c657dd44b142-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" (UID: \"a995962a0d4f04a84dc9c657dd44b142\") " pod="kube-system/kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:09.989401 kubelet[2162]: W0702 07:57:09.989137 2162 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Jul 2 07:57:09.989401 kubelet[2162]: E0702 07:57:09.989209 2162 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:09.991985 kubelet[2162]: W0702 07:57:09.990940 2162 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Jul 2 07:57:10.474000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 07:57:10.474000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005c0580 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:57:10.474000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:10.756166 kubelet[2162]: I0702 07:57:10.756043 2162 apiserver.go:52] "Watching apiserver" Jul 2 07:57:10.780241 kubelet[2162]: I0702 07:57:10.780204 2162 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Jul 2 07:57:10.975233 kubelet[2162]: I0702 07:57:10.975137 2162 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" podStartSLOduration=1.975068563 podStartE2EDuration="1.975068563s" podCreationTimestamp="2024-07-02 07:57:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:57:10.971010354 +0000 UTC m=+1.356697777" watchObservedRunningTime="2024-07-02 07:57:10.975068563 +0000 UTC m=+1.360755979" Jul 2 07:57:11.013739 kubelet[2162]: I0702 07:57:11.013578 2162 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" podStartSLOduration=2.013550187 podStartE2EDuration="2.013550187s" podCreationTimestamp="2024-07-02 07:57:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:57:10.999283792 +0000 UTC m=+1.384971212" watchObservedRunningTime="2024-07-02 07:57:11.013550187 +0000 UTC m=+1.399237608" Jul 2 07:57:11.044042 kubelet[2162]: I0702 07:57:11.043962 2162 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" podStartSLOduration=2.043921294 podStartE2EDuration="2.043921294s" podCreationTimestamp="2024-07-02 07:57:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:57:11.014468799 +0000 UTC m=+1.400156220" watchObservedRunningTime="2024-07-02 07:57:11.043921294 +0000 UTC m=+1.429608711" Jul 2 07:57:15.439881 sudo[1473]: pam_unix(sudo:session): session closed for user root Jul 2 07:57:15.439000 audit[1473]: USER_END pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:57:15.445568 kernel: kauditd_printk_skb: 275 callbacks suppressed Jul 2 07:57:15.445744 kernel: audit: type=1106 audit(1719907035.439:765): pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:57:15.475491 kernel: audit: type=1104 audit(1719907035.442:766): pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:57:15.442000 audit[1473]: CRED_DISP pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:57:15.492905 sshd[1470]: pam_unix(sshd:session): session closed for user core Jul 2 07:57:15.495000 audit[1470]: USER_END pid=1470 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:57:15.500039 systemd[1]: sshd@8-10.128.0.73:22-147.75.109.163:35534.service: Deactivated successfully. Jul 2 07:57:15.501334 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 07:57:15.501686 systemd[1]: session-9.scope: Consumed 5.927s CPU time. Jul 2 07:57:15.504211 systemd-logind[1222]: Session 9 logged out. Waiting for processes to exit. Jul 2 07:57:15.506818 systemd-logind[1222]: Removed session 9. Jul 2 07:57:15.529794 kernel: audit: type=1106 audit(1719907035.495:767): pid=1470 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:57:15.530021 kernel: audit: type=1104 audit(1719907035.495:768): pid=1470 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:57:15.495000 audit[1470]: CRED_DISP pid=1470 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:57:15.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.73:22-147.75.109.163:35534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:15.554477 kernel: audit: type=1131 audit(1719907035.499:769): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.73:22-147.75.109.163:35534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:57:24.040000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:24.066460 kernel: audit: type=1400 audit(1719907044.040:770): avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:24.045000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:24.092465 kernel: audit: type=1400 audit(1719907044.045:771): avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:24.092626 kernel: audit: type=1300 audit(1719907044.045:771): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b63b00 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:57:24.045000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b63b00 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:57:24.045000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:24.156214 kernel: audit: type=1327 audit(1719907044.045:771): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:24.045000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:24.182604 kernel: audit: type=1400 audit(1719907044.045:772): avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:24.045000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b63b40 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:57:24.217553 kernel: audit: type=1300 audit(1719907044.045:772): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b63b40 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:57:24.045000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:24.247461 kernel: audit: type=1327 audit(1719907044.045:772): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:24.045000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:24.308453 kernel: audit: type=1400 audit(1719907044.045:773): avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:57:24.308633 kernel: audit: type=1300 audit(1719907044.045:773): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b63b80 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:57:24.045000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b63b80 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:57:24.045000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:24.040000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cc2d80 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:57:24.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:24.339472 kernel: audit: type=1327 audit(1719907044.045:773): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:57:24.350980 kubelet[2162]: I0702 07:57:24.350918 2162 topology_manager.go:215] "Topology Admit Handler" podUID="2efa5bfb-d946-474a-a897-c719493bd262" podNamespace="kube-system" podName="kube-proxy-jvvwg" Jul 2 07:57:24.359999 systemd[1]: Created slice kubepods-besteffort-pod2efa5bfb_d946_474a_a897_c719493bd262.slice. Jul 2 07:57:24.368280 kubelet[2162]: W0702 07:57:24.368237 2162 reflector.go:547] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal' and this object Jul 2 07:57:24.368451 kubelet[2162]: E0702 07:57:24.368292 2162 reflector.go:150] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal' and this object Jul 2 07:57:24.368451 kubelet[2162]: W0702 07:57:24.368388 2162 reflector.go:547] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal' and this object Jul 2 07:57:24.368451 kubelet[2162]: E0702 07:57:24.368410 2162 reflector.go:150] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal' and this object Jul 2 07:57:24.376941 kubelet[2162]: I0702 07:57:24.376908 2162 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 2 07:57:24.377460 env[1237]: time="2024-07-02T07:57:24.377382362Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 07:57:24.377950 kubelet[2162]: I0702 07:57:24.377669 2162 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 2 07:57:24.387973 kubelet[2162]: I0702 07:57:24.387931 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/2efa5bfb-d946-474a-a897-c719493bd262-kube-proxy\") pod \"kube-proxy-jvvwg\" (UID: \"2efa5bfb-d946-474a-a897-c719493bd262\") " pod="kube-system/kube-proxy-jvvwg" Jul 2 07:57:24.388135 kubelet[2162]: I0702 07:57:24.387986 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4d5gg\" (UniqueName: \"kubernetes.io/projected/2efa5bfb-d946-474a-a897-c719493bd262-kube-api-access-4d5gg\") pod \"kube-proxy-jvvwg\" (UID: \"2efa5bfb-d946-474a-a897-c719493bd262\") " pod="kube-system/kube-proxy-jvvwg" Jul 2 07:57:24.388135 kubelet[2162]: I0702 07:57:24.388020 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2efa5bfb-d946-474a-a897-c719493bd262-xtables-lock\") pod \"kube-proxy-jvvwg\" (UID: \"2efa5bfb-d946-474a-a897-c719493bd262\") " pod="kube-system/kube-proxy-jvvwg" Jul 2 07:57:24.388135 kubelet[2162]: I0702 07:57:24.388049 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2efa5bfb-d946-474a-a897-c719493bd262-lib-modules\") pod \"kube-proxy-jvvwg\" (UID: \"2efa5bfb-d946-474a-a897-c719493bd262\") " pod="kube-system/kube-proxy-jvvwg" Jul 2 07:57:24.814913 kubelet[2162]: I0702 07:57:24.814859 2162 topology_manager.go:215] "Topology Admit Handler" podUID="8ac7517f-ee1e-4d4e-b862-05ea091f5062" podNamespace="tigera-operator" podName="tigera-operator-76ff79f7fd-qflnt" Jul 2 07:57:24.823402 systemd[1]: Created slice kubepods-besteffort-pod8ac7517f_ee1e_4d4e_b862_05ea091f5062.slice. Jul 2 07:57:24.891469 kubelet[2162]: I0702 07:57:24.891404 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c5hg5\" (UniqueName: \"kubernetes.io/projected/8ac7517f-ee1e-4d4e-b862-05ea091f5062-kube-api-access-c5hg5\") pod \"tigera-operator-76ff79f7fd-qflnt\" (UID: \"8ac7517f-ee1e-4d4e-b862-05ea091f5062\") " pod="tigera-operator/tigera-operator-76ff79f7fd-qflnt" Jul 2 07:57:24.891719 kubelet[2162]: I0702 07:57:24.891687 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8ac7517f-ee1e-4d4e-b862-05ea091f5062-var-lib-calico\") pod \"tigera-operator-76ff79f7fd-qflnt\" (UID: \"8ac7517f-ee1e-4d4e-b862-05ea091f5062\") " pod="tigera-operator/tigera-operator-76ff79f7fd-qflnt" Jul 2 07:57:25.131556 env[1237]: time="2024-07-02T07:57:25.130919364Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76ff79f7fd-qflnt,Uid:8ac7517f-ee1e-4d4e-b862-05ea091f5062,Namespace:tigera-operator,Attempt:0,}" Jul 2 07:57:25.162228 env[1237]: time="2024-07-02T07:57:25.162123469Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:25.162228 env[1237]: time="2024-07-02T07:57:25.162183109Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:25.162228 env[1237]: time="2024-07-02T07:57:25.162202951Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:25.162888 env[1237]: time="2024-07-02T07:57:25.162808636Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cf14f14f6eadd639c59482d4e9c67e43582e9792520a00d5fc9f6532e398d971 pid=2247 runtime=io.containerd.runc.v2 Jul 2 07:57:25.195177 systemd[1]: run-containerd-runc-k8s.io-cf14f14f6eadd639c59482d4e9c67e43582e9792520a00d5fc9f6532e398d971-runc.yUagqJ.mount: Deactivated successfully. Jul 2 07:57:25.200773 systemd[1]: Started cri-containerd-cf14f14f6eadd639c59482d4e9c67e43582e9792520a00d5fc9f6532e398d971.scope. Jul 2 07:57:25.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.217000 audit: BPF prog-id=109 op=LOAD Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2247 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:25.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366313466313466366561646436333963353934383264346539633637 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2247 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:25.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366313466313466366561646436333963353934383264346539633637 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit: BPF prog-id=110 op=LOAD Jul 2 07:57:25.218000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a95d0 items=0 ppid=2247 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:25.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366313466313466366561646436333963353934383264346539633637 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit: BPF prog-id=111 op=LOAD Jul 2 07:57:25.218000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a9618 items=0 ppid=2247 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:25.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366313466313466366561646436333963353934383264346539633637 Jul 2 07:57:25.218000 audit: BPF prog-id=111 op=UNLOAD Jul 2 07:57:25.218000 audit: BPF prog-id=110 op=UNLOAD Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:25.218000 audit: BPF prog-id=112 op=LOAD Jul 2 07:57:25.218000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a9a28 items=0 ppid=2247 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:25.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366313466313466366561646436333963353934383264346539633637 Jul 2 07:57:25.266626 env[1237]: time="2024-07-02T07:57:25.266565113Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76ff79f7fd-qflnt,Uid:8ac7517f-ee1e-4d4e-b862-05ea091f5062,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"cf14f14f6eadd639c59482d4e9c67e43582e9792520a00d5fc9f6532e398d971\"" Jul 2 07:57:25.271839 env[1237]: time="2024-07-02T07:57:25.271792718Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\"" Jul 2 07:57:25.504314 kubelet[2162]: E0702 07:57:25.504245 2162 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Jul 2 07:57:25.504314 kubelet[2162]: E0702 07:57:25.504299 2162 projected.go:200] Error preparing data for projected volume kube-api-access-4d5gg for pod kube-system/kube-proxy-jvvwg: failed to sync configmap cache: timed out waiting for the condition Jul 2 07:57:25.505097 kubelet[2162]: E0702 07:57:25.504395 2162 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/2efa5bfb-d946-474a-a897-c719493bd262-kube-api-access-4d5gg podName:2efa5bfb-d946-474a-a897-c719493bd262 nodeName:}" failed. No retries permitted until 2024-07-02 07:57:26.004365574 +0000 UTC m=+16.390052972 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-4d5gg" (UniqueName: "kubernetes.io/projected/2efa5bfb-d946-474a-a897-c719493bd262-kube-api-access-4d5gg") pod "kube-proxy-jvvwg" (UID: "2efa5bfb-d946-474a-a897-c719493bd262") : failed to sync configmap cache: timed out waiting for the condition Jul 2 07:57:26.175078 env[1237]: time="2024-07-02T07:57:26.175020385Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jvvwg,Uid:2efa5bfb-d946-474a-a897-c719493bd262,Namespace:kube-system,Attempt:0,}" Jul 2 07:57:26.233579 env[1237]: time="2024-07-02T07:57:26.227790900Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:26.233579 env[1237]: time="2024-07-02T07:57:26.227837429Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:26.233579 env[1237]: time="2024-07-02T07:57:26.227855386Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:26.233579 env[1237]: time="2024-07-02T07:57:26.228029371Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2a3ce025fe8800235119a728aee4f0049aef02c251b536d7edd973567ad9eebc pid=2289 runtime=io.containerd.runc.v2 Jul 2 07:57:26.286878 systemd[1]: Started cri-containerd-2a3ce025fe8800235119a728aee4f0049aef02c251b536d7edd973567ad9eebc.scope. Jul 2 07:57:26.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.334000 audit: BPF prog-id=113 op=LOAD Jul 2 07:57:26.335000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.335000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2289 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261336365303235666538383030323335313139613732386165653466 Jul 2 07:57:26.335000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.335000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2289 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261336365303235666538383030323335313139613732386165653466 Jul 2 07:57:26.335000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.335000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.335000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.335000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.335000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.335000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.335000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.335000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.335000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.335000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.335000 audit: BPF prog-id=114 op=LOAD Jul 2 07:57:26.335000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000280ce0 items=0 ppid=2289 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261336365303235666538383030323335313139613732386165653466 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit: BPF prog-id=115 op=LOAD Jul 2 07:57:26.336000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000280d28 items=0 ppid=2289 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261336365303235666538383030323335313139613732386165653466 Jul 2 07:57:26.336000 audit: BPF prog-id=115 op=UNLOAD Jul 2 07:57:26.336000 audit: BPF prog-id=114 op=UNLOAD Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.336000 audit: BPF prog-id=116 op=LOAD Jul 2 07:57:26.336000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000281138 items=0 ppid=2289 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261336365303235666538383030323335313139613732386165653466 Jul 2 07:57:26.369727 env[1237]: time="2024-07-02T07:57:26.369648201Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jvvwg,Uid:2efa5bfb-d946-474a-a897-c719493bd262,Namespace:kube-system,Attempt:0,} returns sandbox id \"2a3ce025fe8800235119a728aee4f0049aef02c251b536d7edd973567ad9eebc\"" Jul 2 07:57:26.375771 env[1237]: time="2024-07-02T07:57:26.375715810Z" level=info msg="CreateContainer within sandbox \"2a3ce025fe8800235119a728aee4f0049aef02c251b536d7edd973567ad9eebc\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 07:57:26.407967 env[1237]: time="2024-07-02T07:57:26.407921137Z" level=info msg="CreateContainer within sandbox \"2a3ce025fe8800235119a728aee4f0049aef02c251b536d7edd973567ad9eebc\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"e9a8099059d5b5f2f461b4a335ec9dda3de0edd847521fbc6f794760a2c0ff25\"" Jul 2 07:57:26.411348 env[1237]: time="2024-07-02T07:57:26.411299277Z" level=info msg="StartContainer for \"e9a8099059d5b5f2f461b4a335ec9dda3de0edd847521fbc6f794760a2c0ff25\"" Jul 2 07:57:26.446012 systemd[1]: Started cri-containerd-e9a8099059d5b5f2f461b4a335ec9dda3de0edd847521fbc6f794760a2c0ff25.scope. Jul 2 07:57:26.489000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.489000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f79600b2328 items=0 ppid=2289 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539613830393930353964356235663266343631623461333335656339 Jul 2 07:57:26.490000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.490000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.490000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.490000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.490000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.490000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.490000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.490000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.490000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.490000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.490000 audit: BPF prog-id=117 op=LOAD Jul 2 07:57:26.490000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000224888 items=0 ppid=2289 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539613830393930353964356235663266343631623461333335656339 Jul 2 07:57:26.491000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.491000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.491000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.491000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.491000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.491000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.491000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.491000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.491000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.491000 audit: BPF prog-id=118 op=LOAD Jul 2 07:57:26.491000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002248d8 items=0 ppid=2289 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539613830393930353964356235663266343631623461333335656339 Jul 2 07:57:26.493000 audit: BPF prog-id=118 op=UNLOAD Jul 2 07:57:26.493000 audit: BPF prog-id=117 op=UNLOAD Jul 2 07:57:26.493000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.493000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.493000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.493000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.493000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.493000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.493000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.493000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.493000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.493000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:26.493000 audit: BPF prog-id=119 op=LOAD Jul 2 07:57:26.493000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000224968 items=0 ppid=2289 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539613830393930353964356235663266343631623461333335656339 Jul 2 07:57:26.529628 env[1237]: time="2024-07-02T07:57:26.529573774Z" level=info msg="StartContainer for \"e9a8099059d5b5f2f461b4a335ec9dda3de0edd847521fbc6f794760a2c0ff25\" returns successfully" Jul 2 07:57:26.677000 audit[2385]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.677000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe08edb440 a2=0 a3=7ffe08edb42c items=0 ppid=2344 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.677000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:57:26.679000 audit[2386]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.679000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc66331990 a2=0 a3=7ffc6633197c items=0 ppid=2344 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.679000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:57:26.682000 audit[2387]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.682000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3b288d20 a2=0 a3=7ffe3b288d0c items=0 ppid=2344 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.682000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:57:26.684000 audit[2384]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:26.684000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde0a88ee0 a2=0 a3=7ffde0a88ecc items=0 ppid=2344 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:57:26.686000 audit[2388]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:26.686000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff93a5f790 a2=0 a3=7fff93a5f77c items=0 ppid=2344 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.686000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:57:26.689000 audit[2389]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:26.689000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff237a2210 a2=0 a3=7fff237a21fc items=0 ppid=2344 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.689000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:57:26.768000 audit[2390]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.768000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdc61b3770 a2=0 a3=7ffdc61b375c items=0 ppid=2344 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.768000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:57:26.773000 audit[2392]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.773000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdd8919210 a2=0 a3=7ffdd89191fc items=0 ppid=2344 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 07:57:26.781000 audit[2395]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.781000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffff2383aa0 a2=0 a3=7ffff2383a8c items=0 ppid=2344 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.781000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 07:57:26.784000 audit[2396]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.784000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8a0112a0 a2=0 a3=7ffd8a01128c items=0 ppid=2344 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.784000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:57:26.789000 audit[2398]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.789000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe26918340 a2=0 a3=7ffe2691832c items=0 ppid=2344 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:57:26.792000 audit[2399]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.792000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc792004e0 a2=0 a3=7ffc792004cc items=0 ppid=2344 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:57:26.798000 audit[2401]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.798000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff18077940 a2=0 a3=7fff1807792c items=0 ppid=2344 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.798000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:57:26.805000 audit[2404]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.805000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd5b7d1ce0 a2=0 a3=7ffd5b7d1ccc items=0 ppid=2344 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.805000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 07:57:26.808000 audit[2405]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.808000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2e56a540 a2=0 a3=7ffc2e56a52c items=0 ppid=2344 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.808000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:57:26.813000 audit[2407]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.813000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd6ed70280 a2=0 a3=7ffd6ed7026c items=0 ppid=2344 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.813000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:57:26.815000 audit[2408]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.815000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3f1cf7d0 a2=0 a3=7ffc3f1cf7bc items=0 ppid=2344 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.815000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:57:26.821000 audit[2410]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.821000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe2cb54320 a2=0 a3=7ffe2cb5430c items=0 ppid=2344 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.821000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:57:26.828000 audit[2413]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.828000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff87829c00 a2=0 a3=7fff87829bec items=0 ppid=2344 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.828000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:57:26.836000 audit[2416]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.836000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc85663580 a2=0 a3=7ffc8566356c items=0 ppid=2344 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:57:26.838000 audit[2417]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.838000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc039bc470 a2=0 a3=7ffc039bc45c items=0 ppid=2344 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.838000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:57:26.843000 audit[2419]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.843000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffafc29f80 a2=0 a3=7fffafc29f6c items=0 ppid=2344 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.843000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:57:26.851000 audit[2422]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.851000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff72e946c0 a2=0 a3=7fff72e946ac items=0 ppid=2344 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.851000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:57:26.855000 audit[2423]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.855000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda39884f0 a2=0 a3=7ffda39884dc items=0 ppid=2344 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.855000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:57:26.861000 audit[2425]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:57:26.861000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fffb7b35bb0 a2=0 a3=7fffb7b35b9c items=0 ppid=2344 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.861000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:57:26.905000 audit[2431]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2431 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:26.905000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffeb671aff0 a2=0 a3=7ffeb671afdc items=0 ppid=2344 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.905000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:26.920000 audit[2431]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2431 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:26.920000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffeb671aff0 a2=0 a3=7ffeb671afdc items=0 ppid=2344 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.920000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:26.924000 audit[2436]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:26.924000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffddaa2c620 a2=0 a3=7ffddaa2c60c items=0 ppid=2344 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.924000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:57:26.929000 audit[2438]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:26.929000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffc99ecbc0 a2=0 a3=7fffc99ecbac items=0 ppid=2344 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.929000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 07:57:26.937000 audit[2441]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:26.937000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd0ac0f910 a2=0 a3=7ffd0ac0f8fc items=0 ppid=2344 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.937000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 07:57:26.943000 audit[2442]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2442 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:26.943000 audit[2442]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4c49d860 a2=0 a3=7fff4c49d84c items=0 ppid=2344 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.943000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:57:26.963640 kubelet[2162]: I0702 07:57:26.963303 2162 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-jvvwg" podStartSLOduration=2.963261429 podStartE2EDuration="2.963261429s" podCreationTimestamp="2024-07-02 07:57:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:57:26.961282672 +0000 UTC m=+17.346970082" watchObservedRunningTime="2024-07-02 07:57:26.963261429 +0000 UTC m=+17.348948840" Jul 2 07:57:26.973000 audit[2444]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:26.973000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe79ddf170 a2=0 a3=7ffe79ddf15c items=0 ppid=2344 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.973000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:57:26.977000 audit[2445]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2445 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:26.977000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda1893a20 a2=0 a3=7ffda1893a0c items=0 ppid=2344 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.977000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:57:26.986000 audit[2447]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2447 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:26.986000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd47f16010 a2=0 a3=7ffd47f15ffc items=0 ppid=2344 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.986000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 07:57:26.993000 audit[2450]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2450 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:26.993000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd3b8af420 a2=0 a3=7ffd3b8af40c items=0 ppid=2344 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.993000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:57:26.995000 audit[2451]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2451 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:26.995000 audit[2451]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3852b260 a2=0 a3=7ffe3852b24c items=0 ppid=2344 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:26.995000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:57:27.000000 audit[2453]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2453 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:27.000000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4d73fb20 a2=0 a3=7ffc4d73fb0c items=0 ppid=2344 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.000000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:57:27.002000 audit[2454]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2454 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:27.002000 audit[2454]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd784c3f40 a2=0 a3=7ffd784c3f2c items=0 ppid=2344 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.002000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:57:27.006000 audit[2456]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2456 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:27.006000 audit[2456]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc1f7877b0 a2=0 a3=7ffc1f78779c items=0 ppid=2344 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.006000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:57:27.012278 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2950870092.mount: Deactivated successfully. Jul 2 07:57:27.027000 audit[2459]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2459 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:27.027000 audit[2459]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc88c92380 a2=0 a3=7ffc88c9236c items=0 ppid=2344 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.027000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:57:27.045000 audit[2462]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:27.045000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd1581310 a2=0 a3=7ffdd15812fc items=0 ppid=2344 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.045000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 07:57:27.047000 audit[2463]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2463 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:27.047000 audit[2463]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff473f1cd0 a2=0 a3=7fff473f1cbc items=0 ppid=2344 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.047000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:57:27.059000 audit[2465]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2465 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:27.059000 audit[2465]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc2f079210 a2=0 a3=7ffc2f0791fc items=0 ppid=2344 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.059000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:57:27.065000 audit[2468]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:27.065000 audit[2468]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcda23b840 a2=0 a3=7ffcda23b82c items=0 ppid=2344 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.065000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:57:27.067000 audit[2469]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:27.067000 audit[2469]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5880c500 a2=0 a3=7ffc5880c4ec items=0 ppid=2344 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.067000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:57:27.072000 audit[2471]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2471 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:27.072000 audit[2471]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdc913b120 a2=0 a3=7ffdc913b10c items=0 ppid=2344 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.072000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:57:27.074000 audit[2472]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:27.074000 audit[2472]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc3487b90 a2=0 a3=7fffc3487b7c items=0 ppid=2344 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.074000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:57:27.078000 audit[2474]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:27.078000 audit[2474]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcbdfe55d0 a2=0 a3=7ffcbdfe55bc items=0 ppid=2344 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.078000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:57:27.085000 audit[2477]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:57:27.085000 audit[2477]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc056e4ce0 a2=0 a3=7ffc056e4ccc items=0 ppid=2344 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.085000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:57:27.090000 audit[2479]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:57:27.090000 audit[2479]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe885a01a0 a2=0 a3=7ffe885a018c items=0 ppid=2344 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.090000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:27.090000 audit[2479]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:57:27.090000 audit[2479]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe885a01a0 a2=0 a3=7ffe885a018c items=0 ppid=2344 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.090000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:27.512853 env[1237]: time="2024-07-02T07:57:27.512773874Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:27.515812 env[1237]: time="2024-07-02T07:57:27.515750904Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:27.518386 env[1237]: time="2024-07-02T07:57:27.518336366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:27.520844 env[1237]: time="2024-07-02T07:57:27.520794611Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:479ddc7ff9ab095058b96f6710bbf070abada86332e267d6e5dcc1df36ba2cc5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:27.521595 env[1237]: time="2024-07-02T07:57:27.521543528Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\" returns image reference \"sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d\"" Jul 2 07:57:27.526348 env[1237]: time="2024-07-02T07:57:27.526305038Z" level=info msg="CreateContainer within sandbox \"cf14f14f6eadd639c59482d4e9c67e43582e9792520a00d5fc9f6532e398d971\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 2 07:57:27.544613 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount247393486.mount: Deactivated successfully. Jul 2 07:57:27.555613 env[1237]: time="2024-07-02T07:57:27.555527505Z" level=info msg="CreateContainer within sandbox \"cf14f14f6eadd639c59482d4e9c67e43582e9792520a00d5fc9f6532e398d971\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"bbcff1de609693cde5dbed5f73c27044ee144fbbb7e91d8dab27ad7c29883f01\"" Jul 2 07:57:27.557873 env[1237]: time="2024-07-02T07:57:27.557833827Z" level=info msg="StartContainer for \"bbcff1de609693cde5dbed5f73c27044ee144fbbb7e91d8dab27ad7c29883f01\"" Jul 2 07:57:27.588912 systemd[1]: Started cri-containerd-bbcff1de609693cde5dbed5f73c27044ee144fbbb7e91d8dab27ad7c29883f01.scope. Jul 2 07:57:27.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.613000 audit: BPF prog-id=120 op=LOAD Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2247 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262636666316465363039363933636465356462656435663733633237 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2247 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262636666316465363039363933636465356462656435663733633237 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit: BPF prog-id=121 op=LOAD Jul 2 07:57:27.614000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002cddf0 items=0 ppid=2247 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262636666316465363039363933636465356462656435663733633237 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit: BPF prog-id=122 op=LOAD Jul 2 07:57:27.614000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002cde38 items=0 ppid=2247 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262636666316465363039363933636465356462656435663733633237 Jul 2 07:57:27.614000 audit: BPF prog-id=122 op=UNLOAD Jul 2 07:57:27.614000 audit: BPF prog-id=121 op=UNLOAD Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:27.614000 audit: BPF prog-id=123 op=LOAD Jul 2 07:57:27.614000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000392248 items=0 ppid=2247 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:27.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262636666316465363039363933636465356462656435663733633237 Jul 2 07:57:27.638318 env[1237]: time="2024-07-02T07:57:27.638268814Z" level=info msg="StartContainer for \"bbcff1de609693cde5dbed5f73c27044ee144fbbb7e91d8dab27ad7c29883f01\" returns successfully" Jul 2 07:57:27.958780 kubelet[2162]: I0702 07:57:27.958632 2162 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76ff79f7fd-qflnt" podStartSLOduration=1.703888761 podStartE2EDuration="3.95858242s" podCreationTimestamp="2024-07-02 07:57:24 +0000 UTC" firstStartedPulling="2024-07-02 07:57:25.268625119 +0000 UTC m=+15.654312513" lastFinishedPulling="2024-07-02 07:57:27.523318773 +0000 UTC m=+17.909006172" observedRunningTime="2024-07-02 07:57:27.958274371 +0000 UTC m=+18.343961793" watchObservedRunningTime="2024-07-02 07:57:27.95858242 +0000 UTC m=+18.344269843" Jul 2 07:57:30.604394 kernel: kauditd_printk_skb: 369 callbacks suppressed Jul 2 07:57:30.604619 kernel: audit: type=1325 audit(1719907050.591:885): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2521 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:30.591000 audit[2521]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2521 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:30.591000 audit[2521]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff3a788f40 a2=0 a3=7fff3a788f2c items=0 ppid=2344 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:30.648326 kernel: audit: type=1300 audit(1719907050.591:885): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff3a788f40 a2=0 a3=7fff3a788f2c items=0 ppid=2344 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:30.591000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:30.664527 kernel: audit: type=1327 audit(1719907050.591:885): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:30.592000 audit[2521]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2521 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:30.592000 audit[2521]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff3a788f40 a2=0 a3=0 items=0 ppid=2344 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:30.714064 kernel: audit: type=1325 audit(1719907050.592:886): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2521 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:30.714223 kernel: audit: type=1300 audit(1719907050.592:886): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff3a788f40 a2=0 a3=0 items=0 ppid=2344 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:30.716833 kernel: audit: type=1327 audit(1719907050.592:886): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:30.592000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:30.670000 audit[2523]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2523 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:30.670000 audit[2523]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdb05bb820 a2=0 a3=7ffdb05bb80c items=0 ppid=2344 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:30.781035 kernel: audit: type=1325 audit(1719907050.670:887): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2523 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:30.781220 kernel: audit: type=1300 audit(1719907050.670:887): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdb05bb820 a2=0 a3=7ffdb05bb80c items=0 ppid=2344 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:30.781268 kernel: audit: type=1327 audit(1719907050.670:887): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:30.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:30.804180 kubelet[2162]: I0702 07:57:30.804129 2162 topology_manager.go:215] "Topology Admit Handler" podUID="c2308ac5-fd91-4435-b33b-ed2a1be34cdd" podNamespace="calico-system" podName="calico-typha-587d449bbb-zmctz" Jul 2 07:57:30.729000 audit[2523]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2523 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:30.813210 systemd[1]: Created slice kubepods-besteffort-podc2308ac5_fd91_4435_b33b_ed2a1be34cdd.slice. Jul 2 07:57:30.822465 kernel: audit: type=1325 audit(1719907050.729:888): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2523 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:30.841713 kubelet[2162]: I0702 07:57:30.841590 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/c2308ac5-fd91-4435-b33b-ed2a1be34cdd-typha-certs\") pod \"calico-typha-587d449bbb-zmctz\" (UID: \"c2308ac5-fd91-4435-b33b-ed2a1be34cdd\") " pod="calico-system/calico-typha-587d449bbb-zmctz" Jul 2 07:57:30.842221 kubelet[2162]: I0702 07:57:30.842185 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cfpkd\" (UniqueName: \"kubernetes.io/projected/c2308ac5-fd91-4435-b33b-ed2a1be34cdd-kube-api-access-cfpkd\") pod \"calico-typha-587d449bbb-zmctz\" (UID: \"c2308ac5-fd91-4435-b33b-ed2a1be34cdd\") " pod="calico-system/calico-typha-587d449bbb-zmctz" Jul 2 07:57:30.842494 kubelet[2162]: I0702 07:57:30.842406 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c2308ac5-fd91-4435-b33b-ed2a1be34cdd-tigera-ca-bundle\") pod \"calico-typha-587d449bbb-zmctz\" (UID: \"c2308ac5-fd91-4435-b33b-ed2a1be34cdd\") " pod="calico-system/calico-typha-587d449bbb-zmctz" Jul 2 07:57:30.729000 audit[2523]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdb05bb820 a2=0 a3=0 items=0 ppid=2344 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:30.729000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:30.929028 kubelet[2162]: I0702 07:57:30.928968 2162 topology_manager.go:215] "Topology Admit Handler" podUID="01ac1c7c-3f43-405d-a1b1-e75975274a5d" podNamespace="calico-system" podName="calico-node-dpgz4" Jul 2 07:57:30.939059 systemd[1]: Created slice kubepods-besteffort-pod01ac1c7c_3f43_405d_a1b1_e75975274a5d.slice. Jul 2 07:57:31.042548 kubelet[2162]: I0702 07:57:31.042487 2162 topology_manager.go:215] "Topology Admit Handler" podUID="d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73" podNamespace="calico-system" podName="csi-node-driver-wwmcp" Jul 2 07:57:31.042912 kubelet[2162]: E0702 07:57:31.042877 2162 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wwmcp" podUID="d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73" Jul 2 07:57:31.044576 kubelet[2162]: I0702 07:57:31.044518 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/01ac1c7c-3f43-405d-a1b1-e75975274a5d-tigera-ca-bundle\") pod \"calico-node-dpgz4\" (UID: \"01ac1c7c-3f43-405d-a1b1-e75975274a5d\") " pod="calico-system/calico-node-dpgz4" Jul 2 07:57:31.044705 kubelet[2162]: I0702 07:57:31.044577 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/01ac1c7c-3f43-405d-a1b1-e75975274a5d-flexvol-driver-host\") pod \"calico-node-dpgz4\" (UID: \"01ac1c7c-3f43-405d-a1b1-e75975274a5d\") " pod="calico-system/calico-node-dpgz4" Jul 2 07:57:31.044705 kubelet[2162]: I0702 07:57:31.044611 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/01ac1c7c-3f43-405d-a1b1-e75975274a5d-cni-net-dir\") pod \"calico-node-dpgz4\" (UID: \"01ac1c7c-3f43-405d-a1b1-e75975274a5d\") " pod="calico-system/calico-node-dpgz4" Jul 2 07:57:31.044705 kubelet[2162]: I0702 07:57:31.044637 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/01ac1c7c-3f43-405d-a1b1-e75975274a5d-cni-bin-dir\") pod \"calico-node-dpgz4\" (UID: \"01ac1c7c-3f43-405d-a1b1-e75975274a5d\") " pod="calico-system/calico-node-dpgz4" Jul 2 07:57:31.044705 kubelet[2162]: I0702 07:57:31.044668 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/01ac1c7c-3f43-405d-a1b1-e75975274a5d-xtables-lock\") pod \"calico-node-dpgz4\" (UID: \"01ac1c7c-3f43-405d-a1b1-e75975274a5d\") " pod="calico-system/calico-node-dpgz4" Jul 2 07:57:31.044705 kubelet[2162]: I0702 07:57:31.044694 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/01ac1c7c-3f43-405d-a1b1-e75975274a5d-node-certs\") pod \"calico-node-dpgz4\" (UID: \"01ac1c7c-3f43-405d-a1b1-e75975274a5d\") " pod="calico-system/calico-node-dpgz4" Jul 2 07:57:31.044999 kubelet[2162]: I0702 07:57:31.044725 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/01ac1c7c-3f43-405d-a1b1-e75975274a5d-lib-modules\") pod \"calico-node-dpgz4\" (UID: \"01ac1c7c-3f43-405d-a1b1-e75975274a5d\") " pod="calico-system/calico-node-dpgz4" Jul 2 07:57:31.044999 kubelet[2162]: I0702 07:57:31.044753 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mhmcq\" (UniqueName: \"kubernetes.io/projected/01ac1c7c-3f43-405d-a1b1-e75975274a5d-kube-api-access-mhmcq\") pod \"calico-node-dpgz4\" (UID: \"01ac1c7c-3f43-405d-a1b1-e75975274a5d\") " pod="calico-system/calico-node-dpgz4" Jul 2 07:57:31.044999 kubelet[2162]: I0702 07:57:31.044785 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/01ac1c7c-3f43-405d-a1b1-e75975274a5d-var-run-calico\") pod \"calico-node-dpgz4\" (UID: \"01ac1c7c-3f43-405d-a1b1-e75975274a5d\") " pod="calico-system/calico-node-dpgz4" Jul 2 07:57:31.044999 kubelet[2162]: I0702 07:57:31.044811 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/01ac1c7c-3f43-405d-a1b1-e75975274a5d-cni-log-dir\") pod \"calico-node-dpgz4\" (UID: \"01ac1c7c-3f43-405d-a1b1-e75975274a5d\") " pod="calico-system/calico-node-dpgz4" Jul 2 07:57:31.044999 kubelet[2162]: I0702 07:57:31.044838 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/01ac1c7c-3f43-405d-a1b1-e75975274a5d-policysync\") pod \"calico-node-dpgz4\" (UID: \"01ac1c7c-3f43-405d-a1b1-e75975274a5d\") " pod="calico-system/calico-node-dpgz4" Jul 2 07:57:31.045251 kubelet[2162]: I0702 07:57:31.044865 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/01ac1c7c-3f43-405d-a1b1-e75975274a5d-var-lib-calico\") pod \"calico-node-dpgz4\" (UID: \"01ac1c7c-3f43-405d-a1b1-e75975274a5d\") " pod="calico-system/calico-node-dpgz4" Jul 2 07:57:31.123562 env[1237]: time="2024-07-02T07:57:31.123467578Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-587d449bbb-zmctz,Uid:c2308ac5-fd91-4435-b33b-ed2a1be34cdd,Namespace:calico-system,Attempt:0,}" Jul 2 07:57:31.148505 kubelet[2162]: I0702 07:57:31.148459 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-84w6d\" (UniqueName: \"kubernetes.io/projected/d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73-kube-api-access-84w6d\") pod \"csi-node-driver-wwmcp\" (UID: \"d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73\") " pod="calico-system/csi-node-driver-wwmcp" Jul 2 07:57:31.148683 kubelet[2162]: I0702 07:57:31.148577 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73-kubelet-dir\") pod \"csi-node-driver-wwmcp\" (UID: \"d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73\") " pod="calico-system/csi-node-driver-wwmcp" Jul 2 07:57:31.148683 kubelet[2162]: I0702 07:57:31.148608 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73-socket-dir\") pod \"csi-node-driver-wwmcp\" (UID: \"d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73\") " pod="calico-system/csi-node-driver-wwmcp" Jul 2 07:57:31.148683 kubelet[2162]: I0702 07:57:31.148667 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73-varrun\") pod \"csi-node-driver-wwmcp\" (UID: \"d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73\") " pod="calico-system/csi-node-driver-wwmcp" Jul 2 07:57:31.148878 kubelet[2162]: I0702 07:57:31.148741 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73-registration-dir\") pod \"csi-node-driver-wwmcp\" (UID: \"d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73\") " pod="calico-system/csi-node-driver-wwmcp" Jul 2 07:57:31.151093 kubelet[2162]: E0702 07:57:31.151061 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.151093 kubelet[2162]: W0702 07:57:31.151091 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.151308 kubelet[2162]: E0702 07:57:31.151134 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.151507 kubelet[2162]: E0702 07:57:31.151482 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.151507 kubelet[2162]: W0702 07:57:31.151504 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.151681 kubelet[2162]: E0702 07:57:31.151529 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.152186 kubelet[2162]: E0702 07:57:31.152127 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.152186 kubelet[2162]: W0702 07:57:31.152150 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.152186 kubelet[2162]: E0702 07:57:31.152174 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.152519 kubelet[2162]: E0702 07:57:31.152501 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.152628 kubelet[2162]: W0702 07:57:31.152522 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.152704 kubelet[2162]: E0702 07:57:31.152636 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.152866 kubelet[2162]: E0702 07:57:31.152841 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.152866 kubelet[2162]: W0702 07:57:31.152859 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.153007 kubelet[2162]: E0702 07:57:31.152972 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.153186 kubelet[2162]: E0702 07:57:31.153159 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.153186 kubelet[2162]: W0702 07:57:31.153173 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.153345 kubelet[2162]: E0702 07:57:31.153305 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.153536 kubelet[2162]: E0702 07:57:31.153517 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.153536 kubelet[2162]: W0702 07:57:31.153536 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.153708 kubelet[2162]: E0702 07:57:31.153650 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.153872 kubelet[2162]: E0702 07:57:31.153844 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.153872 kubelet[2162]: W0702 07:57:31.153867 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.157526 kubelet[2162]: E0702 07:57:31.157498 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.157751 kubelet[2162]: E0702 07:57:31.157715 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.157751 kubelet[2162]: W0702 07:57:31.157739 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.157934 kubelet[2162]: E0702 07:57:31.157871 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.158075 kubelet[2162]: E0702 07:57:31.158056 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.158075 kubelet[2162]: W0702 07:57:31.158074 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.158212 kubelet[2162]: E0702 07:57:31.158181 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.158389 kubelet[2162]: E0702 07:57:31.158364 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.158389 kubelet[2162]: W0702 07:57:31.158381 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.158608 kubelet[2162]: E0702 07:57:31.158505 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.158702 kubelet[2162]: E0702 07:57:31.158685 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.158776 kubelet[2162]: W0702 07:57:31.158703 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.158846 kubelet[2162]: E0702 07:57:31.158816 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.159021 kubelet[2162]: E0702 07:57:31.159001 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.159021 kubelet[2162]: W0702 07:57:31.159019 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.159166 kubelet[2162]: E0702 07:57:31.159124 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.159333 kubelet[2162]: E0702 07:57:31.159301 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.159333 kubelet[2162]: W0702 07:57:31.159319 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.159577 kubelet[2162]: E0702 07:57:31.159419 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.163624 kubelet[2162]: E0702 07:57:31.163600 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.163624 kubelet[2162]: W0702 07:57:31.163622 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.163785 kubelet[2162]: E0702 07:57:31.163644 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.164045 kubelet[2162]: E0702 07:57:31.164025 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.164134 kubelet[2162]: W0702 07:57:31.164046 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.164200 kubelet[2162]: E0702 07:57:31.164159 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.164370 kubelet[2162]: E0702 07:57:31.164350 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.164483 kubelet[2162]: W0702 07:57:31.164370 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.165619 kubelet[2162]: E0702 07:57:31.165586 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.165926 kubelet[2162]: E0702 07:57:31.165904 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.165926 kubelet[2162]: W0702 07:57:31.165926 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.166114 kubelet[2162]: E0702 07:57:31.166043 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.166249 kubelet[2162]: E0702 07:57:31.166229 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.166249 kubelet[2162]: W0702 07:57:31.166248 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.166386 kubelet[2162]: E0702 07:57:31.166360 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.170571 kubelet[2162]: E0702 07:57:31.170546 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.170571 kubelet[2162]: W0702 07:57:31.170569 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.170751 kubelet[2162]: E0702 07:57:31.170696 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.170926 kubelet[2162]: E0702 07:57:31.170905 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.170926 kubelet[2162]: W0702 07:57:31.170925 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.171062 kubelet[2162]: E0702 07:57:31.171042 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.171274 kubelet[2162]: E0702 07:57:31.171250 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.171274 kubelet[2162]: W0702 07:57:31.171271 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.171407 kubelet[2162]: E0702 07:57:31.171382 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.172483 kubelet[2162]: E0702 07:57:31.172014 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.172483 kubelet[2162]: W0702 07:57:31.172032 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.172483 kubelet[2162]: E0702 07:57:31.172275 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.172483 kubelet[2162]: W0702 07:57:31.172288 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.172751 kubelet[2162]: E0702 07:57:31.172550 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.172751 kubelet[2162]: W0702 07:57:31.172563 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.172751 kubelet[2162]: E0702 07:57:31.172580 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.172918 kubelet[2162]: E0702 07:57:31.172899 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.172918 kubelet[2162]: W0702 07:57:31.172912 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.173030 kubelet[2162]: E0702 07:57:31.172927 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.173030 kubelet[2162]: E0702 07:57:31.172959 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.187398 kubelet[2162]: E0702 07:57:31.187279 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.187398 kubelet[2162]: W0702 07:57:31.187312 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.187398 kubelet[2162]: E0702 07:57:31.187343 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.191352 kubelet[2162]: E0702 07:57:31.191323 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.191557 kubelet[2162]: W0702 07:57:31.191534 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.191681 kubelet[2162]: E0702 07:57:31.191662 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.191814 kubelet[2162]: E0702 07:57:31.191795 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.192253 kubelet[2162]: E0702 07:57:31.192236 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.192385 kubelet[2162]: W0702 07:57:31.192366 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.193868 kubelet[2162]: E0702 07:57:31.192620 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.196516 env[1237]: time="2024-07-02T07:57:31.189865159Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:31.196516 env[1237]: time="2024-07-02T07:57:31.189918999Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:31.196516 env[1237]: time="2024-07-02T07:57:31.189938794Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:31.196516 env[1237]: time="2024-07-02T07:57:31.190145124Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7042c1bc54d08dda880053b8e25e690c133c32f3061b93c20dea18ea3a7e3ca0 pid=2556 runtime=io.containerd.runc.v2 Jul 2 07:57:31.226056 systemd[1]: Started cri-containerd-7042c1bc54d08dda880053b8e25e690c133c32f3061b93c20dea18ea3a7e3ca0.scope. Jul 2 07:57:31.236899 kubelet[2162]: E0702 07:57:31.236861 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.236899 kubelet[2162]: W0702 07:57:31.236891 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.237142 kubelet[2162]: E0702 07:57:31.236921 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.249049 env[1237]: time="2024-07-02T07:57:31.248990252Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dpgz4,Uid:01ac1c7c-3f43-405d-a1b1-e75975274a5d,Namespace:calico-system,Attempt:0,}" Jul 2 07:57:31.251594 kubelet[2162]: E0702 07:57:31.251547 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.251594 kubelet[2162]: W0702 07:57:31.251590 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.251831 kubelet[2162]: E0702 07:57:31.251623 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.252087 kubelet[2162]: E0702 07:57:31.252066 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.252087 kubelet[2162]: W0702 07:57:31.252088 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.252234 kubelet[2162]: E0702 07:57:31.252114 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.252522 kubelet[2162]: E0702 07:57:31.252502 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.252522 kubelet[2162]: W0702 07:57:31.252521 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.252715 kubelet[2162]: E0702 07:57:31.252545 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.252900 kubelet[2162]: E0702 07:57:31.252880 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.252900 kubelet[2162]: W0702 07:57:31.252900 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.253043 kubelet[2162]: E0702 07:57:31.252920 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.253830 kubelet[2162]: E0702 07:57:31.253278 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.253830 kubelet[2162]: W0702 07:57:31.253304 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.253830 kubelet[2162]: E0702 07:57:31.253486 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.253830 kubelet[2162]: E0702 07:57:31.253778 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.253830 kubelet[2162]: W0702 07:57:31.253789 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.254179 kubelet[2162]: E0702 07:57:31.253895 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.254179 kubelet[2162]: E0702 07:57:31.254081 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.254179 kubelet[2162]: W0702 07:57:31.254092 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.254358 kubelet[2162]: E0702 07:57:31.254199 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.254426 kubelet[2162]: E0702 07:57:31.254388 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.254426 kubelet[2162]: W0702 07:57:31.254399 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.254563 kubelet[2162]: E0702 07:57:31.254531 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.254742 kubelet[2162]: E0702 07:57:31.254720 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.254742 kubelet[2162]: W0702 07:57:31.254739 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.262540 kubelet[2162]: E0702 07:57:31.262501 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.262782 kubelet[2162]: E0702 07:57:31.262760 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.262782 kubelet[2162]: W0702 07:57:31.262781 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.263001 kubelet[2162]: E0702 07:57:31.262913 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.263350 kubelet[2162]: E0702 07:57:31.263314 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.263350 kubelet[2162]: W0702 07:57:31.263347 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.263544 kubelet[2162]: E0702 07:57:31.263497 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.263848 kubelet[2162]: E0702 07:57:31.263816 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.263848 kubelet[2162]: W0702 07:57:31.263845 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.264009 kubelet[2162]: E0702 07:57:31.263965 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.264962 kubelet[2162]: E0702 07:57:31.264933 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.264962 kubelet[2162]: W0702 07:57:31.264956 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.265144 kubelet[2162]: E0702 07:57:31.265092 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.267724 kubelet[2162]: E0702 07:57:31.267698 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.267848 kubelet[2162]: W0702 07:57:31.267721 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.267940 kubelet[2162]: E0702 07:57:31.267870 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.268123 kubelet[2162]: E0702 07:57:31.268100 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.268123 kubelet[2162]: W0702 07:57:31.268121 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.268300 kubelet[2162]: E0702 07:57:31.268238 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.268474 kubelet[2162]: E0702 07:57:31.268451 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.268474 kubelet[2162]: W0702 07:57:31.268471 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.268649 kubelet[2162]: E0702 07:57:31.268586 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.268844 kubelet[2162]: E0702 07:57:31.268823 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.268844 kubelet[2162]: W0702 07:57:31.268842 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.269001 kubelet[2162]: E0702 07:57:31.268954 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.269366 kubelet[2162]: E0702 07:57:31.269339 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.269366 kubelet[2162]: W0702 07:57:31.269362 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.269722 kubelet[2162]: E0702 07:57:31.269556 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.270134 kubelet[2162]: E0702 07:57:31.270098 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.270134 kubelet[2162]: W0702 07:57:31.270130 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.270292 kubelet[2162]: E0702 07:57:31.270258 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.271190 kubelet[2162]: E0702 07:57:31.271154 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.271190 kubelet[2162]: W0702 07:57:31.271187 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.271373 kubelet[2162]: E0702 07:57:31.271351 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.271693 kubelet[2162]: E0702 07:57:31.271654 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.271693 kubelet[2162]: W0702 07:57:31.271674 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.272064 kubelet[2162]: E0702 07:57:31.271875 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.274592 kubelet[2162]: E0702 07:57:31.274559 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.274592 kubelet[2162]: W0702 07:57:31.274582 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.274904 kubelet[2162]: E0702 07:57:31.274749 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.275158 kubelet[2162]: E0702 07:57:31.275108 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.275158 kubelet[2162]: W0702 07:57:31.275123 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.275309 kubelet[2162]: E0702 07:57:31.275281 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.276011 kubelet[2162]: E0702 07:57:31.275595 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.276011 kubelet[2162]: W0702 07:57:31.275611 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.276011 kubelet[2162]: E0702 07:57:31.275748 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.276011 kubelet[2162]: E0702 07:57:31.275955 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.276011 kubelet[2162]: W0702 07:57:31.275966 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.276011 kubelet[2162]: E0702 07:57:31.275981 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.291786 env[1237]: time="2024-07-02T07:57:31.291688216Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:31.291981 env[1237]: time="2024-07-02T07:57:31.291811116Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:31.291981 env[1237]: time="2024-07-02T07:57:31.291878482Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:31.292224 env[1237]: time="2024-07-02T07:57:31.292162968Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6369cbeb00d987238446171f0ed4001a7e7fba2a5c9ca00139118e9095991e7c pid=2623 runtime=io.containerd.runc.v2 Jul 2 07:57:31.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.298000 audit: BPF prog-id=124 op=LOAD Jul 2 07:57:31.300000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.300000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2556 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:31.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343263316263353464303864646138383030353362386532356536 Jul 2 07:57:31.301000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.301000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2556 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:31.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343263316263353464303864646138383030353362386532356536 Jul 2 07:57:31.302000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.302000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.302000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.302000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.302000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.302000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.302000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.302000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.302000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.302000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.302000 audit: BPF prog-id=125 op=LOAD Jul 2 07:57:31.302000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000303050 items=0 ppid=2556 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:31.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343263316263353464303864646138383030353362386532356536 Jul 2 07:57:31.303000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.303000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.303000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.303000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.303000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.303000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.303000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.303000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.303000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.303000 audit: BPF prog-id=126 op=LOAD Jul 2 07:57:31.303000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000303098 items=0 ppid=2556 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:31.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343263316263353464303864646138383030353362386532356536 Jul 2 07:57:31.304000 audit: BPF prog-id=126 op=UNLOAD Jul 2 07:57:31.305000 audit: BPF prog-id=125 op=UNLOAD Jul 2 07:57:31.305000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.305000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.305000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.305000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.305000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.305000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.305000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.305000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.305000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.305000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.305000 audit: BPF prog-id=127 op=LOAD Jul 2 07:57:31.305000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003034a8 items=0 ppid=2556 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:31.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343263316263353464303864646138383030353362386532356536 Jul 2 07:57:31.315254 kubelet[2162]: E0702 07:57:31.315222 2162 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:57:31.315254 kubelet[2162]: W0702 07:57:31.315253 2162 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:57:31.315492 kubelet[2162]: E0702 07:57:31.315282 2162 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:57:31.327863 systemd[1]: Started cri-containerd-6369cbeb00d987238446171f0ed4001a7e7fba2a5c9ca00139118e9095991e7c.scope. Jul 2 07:57:31.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.401000 audit: BPF prog-id=128 op=LOAD Jul 2 07:57:31.402000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.402000 audit[2633]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2623 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:31.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633363963626562303064393837323338343436313731663065643430 Jul 2 07:57:31.403000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.403000 audit[2633]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2623 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:31.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633363963626562303064393837323338343436313731663065643430 Jul 2 07:57:31.403000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.403000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.403000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.403000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.403000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.403000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.403000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.403000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.403000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.403000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.403000 audit: BPF prog-id=129 op=LOAD Jul 2 07:57:31.403000 audit[2633]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000345cd0 items=0 ppid=2623 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:31.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633363963626562303064393837323338343436313731663065643430 Jul 2 07:57:31.404000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.404000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.404000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.404000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.404000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.404000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.404000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.404000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.404000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.404000 audit: BPF prog-id=130 op=LOAD Jul 2 07:57:31.404000 audit[2633]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000345d18 items=0 ppid=2623 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:31.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633363963626562303064393837323338343436313731663065643430 Jul 2 07:57:31.406000 audit: BPF prog-id=130 op=UNLOAD Jul 2 07:57:31.406000 audit: BPF prog-id=129 op=UNLOAD Jul 2 07:57:31.406000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.406000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.406000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.406000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.406000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.406000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.406000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.406000 audit[2633]: AVC avc: denied { perfmon } for pid=2633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.406000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.406000 audit[2633]: AVC avc: denied { bpf } for pid=2633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:31.406000 audit: BPF prog-id=131 op=LOAD Jul 2 07:57:31.406000 audit[2633]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ba128 items=0 ppid=2623 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:31.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633363963626562303064393837323338343436313731663065643430 Jul 2 07:57:31.452050 env[1237]: time="2024-07-02T07:57:31.451860645Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dpgz4,Uid:01ac1c7c-3f43-405d-a1b1-e75975274a5d,Namespace:calico-system,Attempt:0,} returns sandbox id \"6369cbeb00d987238446171f0ed4001a7e7fba2a5c9ca00139118e9095991e7c\"" Jul 2 07:57:31.463636 env[1237]: time="2024-07-02T07:57:31.463584772Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-587d449bbb-zmctz,Uid:c2308ac5-fd91-4435-b33b-ed2a1be34cdd,Namespace:calico-system,Attempt:0,} returns sandbox id \"7042c1bc54d08dda880053b8e25e690c133c32f3061b93c20dea18ea3a7e3ca0\"" Jul 2 07:57:31.463886 env[1237]: time="2024-07-02T07:57:31.463707738Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 07:57:31.869000 audit[2663]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:31.869000 audit[2663]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff92f48de0 a2=0 a3=7fff92f48dcc items=0 ppid=2344 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:31.869000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:31.870000 audit[2663]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:31.870000 audit[2663]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff92f48de0 a2=0 a3=0 items=0 ppid=2344 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:31.870000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:32.466828 env[1237]: time="2024-07-02T07:57:32.466747580Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:32.469999 env[1237]: time="2024-07-02T07:57:32.469955491Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:32.472998 env[1237]: time="2024-07-02T07:57:32.472954453Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:32.475722 env[1237]: time="2024-07-02T07:57:32.475679631Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:32.476718 env[1237]: time="2024-07-02T07:57:32.476660054Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9\"" Jul 2 07:57:32.480314 env[1237]: time="2024-07-02T07:57:32.480276807Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\"" Jul 2 07:57:32.484482 env[1237]: time="2024-07-02T07:57:32.484408408Z" level=info msg="CreateContainer within sandbox \"6369cbeb00d987238446171f0ed4001a7e7fba2a5c9ca00139118e9095991e7c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 07:57:32.511638 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1901202217.mount: Deactivated successfully. Jul 2 07:57:32.523553 env[1237]: time="2024-07-02T07:57:32.523485776Z" level=info msg="CreateContainer within sandbox \"6369cbeb00d987238446171f0ed4001a7e7fba2a5c9ca00139118e9095991e7c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"485903b84a64688b8ba5fda8ce43977ff176037e0ce3d6eda83e47cf07295fce\"" Jul 2 07:57:32.524336 env[1237]: time="2024-07-02T07:57:32.524299203Z" level=info msg="StartContainer for \"485903b84a64688b8ba5fda8ce43977ff176037e0ce3d6eda83e47cf07295fce\"" Jul 2 07:57:32.560081 systemd[1]: Started cri-containerd-485903b84a64688b8ba5fda8ce43977ff176037e0ce3d6eda83e47cf07295fce.scope. Jul 2 07:57:32.602000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.602000 audit[2672]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1ea472e7c8 items=0 ppid=2623 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:32.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438353930336238346136343638386238626135666461386365343339 Jul 2 07:57:32.602000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.602000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.602000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.602000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.602000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.602000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.602000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.602000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.602000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.602000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.602000 audit: BPF prog-id=132 op=LOAD Jul 2 07:57:32.602000 audit[2672]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032fbd8 items=0 ppid=2623 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:32.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438353930336238346136343638386238626135666461386365343339 Jul 2 07:57:32.604000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.604000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.604000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.604000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.604000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.604000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.604000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.604000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.604000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.604000 audit: BPF prog-id=133 op=LOAD Jul 2 07:57:32.604000 audit[2672]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032fc28 items=0 ppid=2623 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:32.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438353930336238346136343638386238626135666461386365343339 Jul 2 07:57:32.604000 audit: BPF prog-id=133 op=UNLOAD Jul 2 07:57:32.605000 audit: BPF prog-id=132 op=UNLOAD Jul 2 07:57:32.605000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.605000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.605000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.605000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.605000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.605000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.605000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.605000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.605000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.605000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:32.605000 audit: BPF prog-id=134 op=LOAD Jul 2 07:57:32.605000 audit[2672]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00032fcb8 items=0 ppid=2623 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:32.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438353930336238346136343638386238626135666461386365343339 Jul 2 07:57:32.630563 env[1237]: time="2024-07-02T07:57:32.630500398Z" level=info msg="StartContainer for \"485903b84a64688b8ba5fda8ce43977ff176037e0ce3d6eda83e47cf07295fce\" returns successfully" Jul 2 07:57:32.660083 systemd[1]: cri-containerd-485903b84a64688b8ba5fda8ce43977ff176037e0ce3d6eda83e47cf07295fce.scope: Deactivated successfully. Jul 2 07:57:32.663000 audit: BPF prog-id=134 op=UNLOAD Jul 2 07:57:32.945109 kubelet[2162]: E0702 07:57:32.865974 2162 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wwmcp" podUID="d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73" Jul 2 07:57:32.960469 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-485903b84a64688b8ba5fda8ce43977ff176037e0ce3d6eda83e47cf07295fce-rootfs.mount: Deactivated successfully. Jul 2 07:57:32.999235 env[1237]: time="2024-07-02T07:57:32.999153768Z" level=info msg="shim disconnected" id=485903b84a64688b8ba5fda8ce43977ff176037e0ce3d6eda83e47cf07295fce Jul 2 07:57:32.999235 env[1237]: time="2024-07-02T07:57:32.999218572Z" level=warning msg="cleaning up after shim disconnected" id=485903b84a64688b8ba5fda8ce43977ff176037e0ce3d6eda83e47cf07295fce namespace=k8s.io Jul 2 07:57:32.999235 env[1237]: time="2024-07-02T07:57:32.999235909Z" level=info msg="cleaning up dead shim" Jul 2 07:57:33.013032 env[1237]: time="2024-07-02T07:57:33.012970766Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:57:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2711 runtime=io.containerd.runc.v2\n" Jul 2 07:57:34.800571 env[1237]: time="2024-07-02T07:57:34.800508466Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:34.804198 env[1237]: time="2024-07-02T07:57:34.804142139Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:34.809175 env[1237]: time="2024-07-02T07:57:34.809134361Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:34.813077 env[1237]: time="2024-07-02T07:57:34.813035371Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:eff1501af12b7e27e2ef8f4e55d03d837bcb017aa5663e22e519059c452d51ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:34.813966 env[1237]: time="2024-07-02T07:57:34.813927892Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\" returns image reference \"sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc\"" Jul 2 07:57:34.818513 env[1237]: time="2024-07-02T07:57:34.818478120Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 07:57:34.847227 env[1237]: time="2024-07-02T07:57:34.847174096Z" level=info msg="CreateContainer within sandbox \"7042c1bc54d08dda880053b8e25e690c133c32f3061b93c20dea18ea3a7e3ca0\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 2 07:57:34.866674 kubelet[2162]: E0702 07:57:34.866613 2162 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wwmcp" podUID="d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73" Jul 2 07:57:34.875366 env[1237]: time="2024-07-02T07:57:34.875313967Z" level=info msg="CreateContainer within sandbox \"7042c1bc54d08dda880053b8e25e690c133c32f3061b93c20dea18ea3a7e3ca0\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"45b7004336e3abfaeb774c3f3a7afc98d2a4607135097be9b8570b55c52a162a\"" Jul 2 07:57:34.877000 env[1237]: time="2024-07-02T07:57:34.876956651Z" level=info msg="StartContainer for \"45b7004336e3abfaeb774c3f3a7afc98d2a4607135097be9b8570b55c52a162a\"" Jul 2 07:57:34.918165 systemd[1]: Started cri-containerd-45b7004336e3abfaeb774c3f3a7afc98d2a4607135097be9b8570b55c52a162a.scope. Jul 2 07:57:34.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.950000 audit: BPF prog-id=135 op=LOAD Jul 2 07:57:34.951000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.951000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2556 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:34.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623730303433333665336162666165623737346333663361376166 Jul 2 07:57:34.952000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.952000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2556 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:34.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623730303433333665336162666165623737346333663361376166 Jul 2 07:57:34.952000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.952000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.952000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.952000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.952000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.952000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.952000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.952000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.952000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.952000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.952000 audit: BPF prog-id=136 op=LOAD Jul 2 07:57:34.952000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002f1eb0 items=0 ppid=2556 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:34.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623730303433333665336162666165623737346333663361376166 Jul 2 07:57:34.954000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.954000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.954000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.954000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.954000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.954000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.954000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.954000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.954000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.954000 audit: BPF prog-id=137 op=LOAD Jul 2 07:57:34.954000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002f1ef8 items=0 ppid=2556 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:34.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623730303433333665336162666165623737346333663361376166 Jul 2 07:57:34.955000 audit: BPF prog-id=137 op=UNLOAD Jul 2 07:57:34.955000 audit: BPF prog-id=136 op=UNLOAD Jul 2 07:57:34.955000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.955000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.955000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.955000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.955000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.955000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.955000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.955000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.955000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.955000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:34.955000 audit: BPF prog-id=138 op=LOAD Jul 2 07:57:34.955000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003da308 items=0 ppid=2556 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:34.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435623730303433333665336162666165623737346333663361376166 Jul 2 07:57:35.006340 env[1237]: time="2024-07-02T07:57:35.006285407Z" level=info msg="StartContainer for \"45b7004336e3abfaeb774c3f3a7afc98d2a4607135097be9b8570b55c52a162a\" returns successfully" Jul 2 07:57:35.026917 kubelet[2162]: I0702 07:57:35.026825 2162 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-587d449bbb-zmctz" podStartSLOduration=1.6758314859999999 podStartE2EDuration="5.026798165s" podCreationTimestamp="2024-07-02 07:57:30 +0000 UTC" firstStartedPulling="2024-07-02 07:57:31.465704498 +0000 UTC m=+21.851391898" lastFinishedPulling="2024-07-02 07:57:34.816671184 +0000 UTC m=+25.202358577" observedRunningTime="2024-07-02 07:57:35.02574852 +0000 UTC m=+25.411436006" watchObservedRunningTime="2024-07-02 07:57:35.026798165 +0000 UTC m=+25.412485588" Jul 2 07:57:36.018065 kubelet[2162]: I0702 07:57:36.016862 2162 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:57:36.866336 kubelet[2162]: E0702 07:57:36.866280 2162 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wwmcp" podUID="d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73" Jul 2 07:57:38.866569 kubelet[2162]: E0702 07:57:38.866510 2162 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wwmcp" podUID="d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73" Jul 2 07:57:39.151249 env[1237]: time="2024-07-02T07:57:39.151199045Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:39.155238 env[1237]: time="2024-07-02T07:57:39.155189783Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:39.157814 env[1237]: time="2024-07-02T07:57:39.157760168Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:39.160718 env[1237]: time="2024-07-02T07:57:39.160667391Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:39.161603 env[1237]: time="2024-07-02T07:57:39.161561310Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7\"" Jul 2 07:57:39.165739 env[1237]: time="2024-07-02T07:57:39.165543295Z" level=info msg="CreateContainer within sandbox \"6369cbeb00d987238446171f0ed4001a7e7fba2a5c9ca00139118e9095991e7c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 07:57:39.189107 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2054424764.mount: Deactivated successfully. Jul 2 07:57:39.198964 env[1237]: time="2024-07-02T07:57:39.198909407Z" level=info msg="CreateContainer within sandbox \"6369cbeb00d987238446171f0ed4001a7e7fba2a5c9ca00139118e9095991e7c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"669562214bcaccab3441f998cd2fe0431f8e3ded8aad7572e9747b4aba7f4913\"" Jul 2 07:57:39.201180 env[1237]: time="2024-07-02T07:57:39.200063775Z" level=info msg="StartContainer for \"669562214bcaccab3441f998cd2fe0431f8e3ded8aad7572e9747b4aba7f4913\"" Jul 2 07:57:39.240066 systemd[1]: Started cri-containerd-669562214bcaccab3441f998cd2fe0431f8e3ded8aad7572e9747b4aba7f4913.scope. Jul 2 07:57:39.289466 kernel: kauditd_printk_skb: 223 callbacks suppressed Jul 2 07:57:39.289687 kernel: audit: type=1400 audit(1719907059.262:952): avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.262000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.262000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1da85313d8 items=0 ppid=2623 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:39.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636393536323231346263616363616233343431663939386364326665 Jul 2 07:57:39.351840 kernel: audit: type=1300 audit(1719907059.262:952): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1da85313d8 items=0 ppid=2623 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:39.352009 kernel: audit: type=1327 audit(1719907059.262:952): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636393536323231346263616363616233343431663939386364326665 Jul 2 07:57:39.373325 kernel: audit: type=1400 audit(1719907059.262:953): avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.262000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.262000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.262000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.401997 env[1237]: time="2024-07-02T07:57:39.401874595Z" level=info msg="StartContainer for \"669562214bcaccab3441f998cd2fe0431f8e3ded8aad7572e9747b4aba7f4913\" returns successfully" Jul 2 07:57:39.416390 kernel: audit: type=1400 audit(1719907059.262:953): avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.416538 kernel: audit: type=1400 audit(1719907059.262:953): avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.262000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.458963 kernel: audit: type=1400 audit(1719907059.262:953): avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.459155 kernel: audit: type=1400 audit(1719907059.262:953): avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.262000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.262000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.480456 kernel: audit: type=1400 audit(1719907059.262:953): avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.262000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.262000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.262000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.262000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.502456 kernel: audit: type=1400 audit(1719907059.262:953): avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.262000 audit: BPF prog-id=139 op=LOAD Jul 2 07:57:39.262000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002bdff8 items=0 ppid=2623 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:39.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636393536323231346263616363616233343431663939386364326665 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit: BPF prog-id=140 op=LOAD Jul 2 07:57:39.289000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00030e048 items=0 ppid=2623 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:39.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636393536323231346263616363616233343431663939386364326665 Jul 2 07:57:39.289000 audit: BPF prog-id=140 op=UNLOAD Jul 2 07:57:39.289000 audit: BPF prog-id=139 op=UNLOAD Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:39.289000 audit: BPF prog-id=141 op=LOAD Jul 2 07:57:39.289000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00030e0d8 items=0 ppid=2623 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:39.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636393536323231346263616363616233343431663939386364326665 Jul 2 07:57:40.378749 env[1237]: time="2024-07-02T07:57:40.378664084Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:57:40.381999 systemd[1]: cri-containerd-669562214bcaccab3441f998cd2fe0431f8e3ded8aad7572e9747b4aba7f4913.scope: Deactivated successfully. Jul 2 07:57:40.385000 audit: BPF prog-id=141 op=UNLOAD Jul 2 07:57:40.420045 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-669562214bcaccab3441f998cd2fe0431f8e3ded8aad7572e9747b4aba7f4913-rootfs.mount: Deactivated successfully. Jul 2 07:57:40.448974 kubelet[2162]: I0702 07:57:40.448449 2162 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 07:57:40.473014 kubelet[2162]: I0702 07:57:40.472955 2162 topology_manager.go:215] "Topology Admit Handler" podUID="6e423b60-704e-420e-9590-f0e5b18595c2" podNamespace="kube-system" podName="coredns-7db6d8ff4d-cxbn9" Jul 2 07:57:40.481512 systemd[1]: Created slice kubepods-burstable-pod6e423b60_704e_420e_9590_f0e5b18595c2.slice. Jul 2 07:57:40.489261 kubelet[2162]: I0702 07:57:40.489226 2162 topology_manager.go:215] "Topology Admit Handler" podUID="dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59" podNamespace="kube-system" podName="coredns-7db6d8ff4d-xgqmj" Jul 2 07:57:40.493041 kubelet[2162]: I0702 07:57:40.492942 2162 topology_manager.go:215] "Topology Admit Handler" podUID="41b6dc6f-519b-4482-a5ad-eb2bf5a550b7" podNamespace="calico-system" podName="calico-kube-controllers-7bf6c8cb-74b2c" Jul 2 07:57:40.501287 systemd[1]: Created slice kubepods-burstable-poddfd55eb4_c0b4_44ac_8b12_6a7f2cb17c59.slice. Jul 2 07:57:40.510305 systemd[1]: Created slice kubepods-besteffort-pod41b6dc6f_519b_4482_a5ad_eb2bf5a550b7.slice. Jul 2 07:57:40.532380 kubelet[2162]: I0702 07:57:40.532332 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59-config-volume\") pod \"coredns-7db6d8ff4d-xgqmj\" (UID: \"dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59\") " pod="kube-system/coredns-7db6d8ff4d-xgqmj" Jul 2 07:57:40.532729 kubelet[2162]: I0702 07:57:40.532700 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b6sjb\" (UniqueName: \"kubernetes.io/projected/dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59-kube-api-access-b6sjb\") pod \"coredns-7db6d8ff4d-xgqmj\" (UID: \"dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59\") " pod="kube-system/coredns-7db6d8ff4d-xgqmj" Jul 2 07:57:40.532899 kubelet[2162]: I0702 07:57:40.532876 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/41b6dc6f-519b-4482-a5ad-eb2bf5a550b7-tigera-ca-bundle\") pod \"calico-kube-controllers-7bf6c8cb-74b2c\" (UID: \"41b6dc6f-519b-4482-a5ad-eb2bf5a550b7\") " pod="calico-system/calico-kube-controllers-7bf6c8cb-74b2c" Jul 2 07:57:40.533088 kubelet[2162]: I0702 07:57:40.533021 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tg8hq\" (UniqueName: \"kubernetes.io/projected/6e423b60-704e-420e-9590-f0e5b18595c2-kube-api-access-tg8hq\") pod \"coredns-7db6d8ff4d-cxbn9\" (UID: \"6e423b60-704e-420e-9590-f0e5b18595c2\") " pod="kube-system/coredns-7db6d8ff4d-cxbn9" Jul 2 07:57:40.533267 kubelet[2162]: I0702 07:57:40.533244 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6e423b60-704e-420e-9590-f0e5b18595c2-config-volume\") pod \"coredns-7db6d8ff4d-cxbn9\" (UID: \"6e423b60-704e-420e-9590-f0e5b18595c2\") " pod="kube-system/coredns-7db6d8ff4d-cxbn9" Jul 2 07:57:40.533412 kubelet[2162]: I0702 07:57:40.533390 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nscjz\" (UniqueName: \"kubernetes.io/projected/41b6dc6f-519b-4482-a5ad-eb2bf5a550b7-kube-api-access-nscjz\") pod \"calico-kube-controllers-7bf6c8cb-74b2c\" (UID: \"41b6dc6f-519b-4482-a5ad-eb2bf5a550b7\") " pod="calico-system/calico-kube-controllers-7bf6c8cb-74b2c" Jul 2 07:57:40.788420 env[1237]: time="2024-07-02T07:57:40.788350928Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-cxbn9,Uid:6e423b60-704e-420e-9590-f0e5b18595c2,Namespace:kube-system,Attempt:0,}" Jul 2 07:57:40.807155 env[1237]: time="2024-07-02T07:57:40.807097232Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xgqmj,Uid:dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59,Namespace:kube-system,Attempt:0,}" Jul 2 07:57:40.821167 env[1237]: time="2024-07-02T07:57:40.821095536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bf6c8cb-74b2c,Uid:41b6dc6f-519b-4482-a5ad-eb2bf5a550b7,Namespace:calico-system,Attempt:0,}" Jul 2 07:57:40.873215 systemd[1]: Created slice kubepods-besteffort-podd3fe7165_e5c9_4bdf_8cb0_2709b4a3ae73.slice. Jul 2 07:57:40.876588 env[1237]: time="2024-07-02T07:57:40.876535837Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wwmcp,Uid:d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73,Namespace:calico-system,Attempt:0,}" Jul 2 07:57:41.432030 env[1237]: time="2024-07-02T07:57:41.431955335Z" level=info msg="shim disconnected" id=669562214bcaccab3441f998cd2fe0431f8e3ded8aad7572e9747b4aba7f4913 Jul 2 07:57:41.432030 env[1237]: time="2024-07-02T07:57:41.432019121Z" level=warning msg="cleaning up after shim disconnected" id=669562214bcaccab3441f998cd2fe0431f8e3ded8aad7572e9747b4aba7f4913 namespace=k8s.io Jul 2 07:57:41.432030 env[1237]: time="2024-07-02T07:57:41.432034619Z" level=info msg="cleaning up dead shim" Jul 2 07:57:41.446274 env[1237]: time="2024-07-02T07:57:41.446209063Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:57:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2816 runtime=io.containerd.runc.v2\n" Jul 2 07:57:41.654665 env[1237]: time="2024-07-02T07:57:41.654580347Z" level=error msg="Failed to destroy network for sandbox \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:41.655503 env[1237]: time="2024-07-02T07:57:41.655447754Z" level=error msg="encountered an error cleaning up failed sandbox \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:41.655806 env[1237]: time="2024-07-02T07:57:41.655705876Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-cxbn9,Uid:6e423b60-704e-420e-9590-f0e5b18595c2,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:41.659135 kubelet[2162]: E0702 07:57:41.656273 2162 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:41.659135 kubelet[2162]: E0702 07:57:41.656390 2162 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-cxbn9" Jul 2 07:57:41.659135 kubelet[2162]: E0702 07:57:41.656461 2162 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-cxbn9" Jul 2 07:57:41.660798 kubelet[2162]: E0702 07:57:41.656541 2162 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-cxbn9_kube-system(6e423b60-704e-420e-9590-f0e5b18595c2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-cxbn9_kube-system(6e423b60-704e-420e-9590-f0e5b18595c2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-cxbn9" podUID="6e423b60-704e-420e-9590-f0e5b18595c2" Jul 2 07:57:41.698713 env[1237]: time="2024-07-02T07:57:41.698553272Z" level=error msg="Failed to destroy network for sandbox \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:41.699793 env[1237]: time="2024-07-02T07:57:41.699732666Z" level=error msg="encountered an error cleaning up failed sandbox \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:41.700072 env[1237]: time="2024-07-02T07:57:41.700015808Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wwmcp,Uid:d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:41.700859 kubelet[2162]: E0702 07:57:41.700564 2162 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:41.700859 kubelet[2162]: E0702 07:57:41.700657 2162 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wwmcp" Jul 2 07:57:41.700859 kubelet[2162]: E0702 07:57:41.700707 2162 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wwmcp" Jul 2 07:57:41.701128 kubelet[2162]: E0702 07:57:41.700794 2162 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-wwmcp_calico-system(d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-wwmcp_calico-system(d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wwmcp" podUID="d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73" Jul 2 07:57:41.711828 env[1237]: time="2024-07-02T07:57:41.711763120Z" level=error msg="Failed to destroy network for sandbox \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:41.712335 env[1237]: time="2024-07-02T07:57:41.712264704Z" level=error msg="encountered an error cleaning up failed sandbox \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:41.712492 env[1237]: time="2024-07-02T07:57:41.712359415Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bf6c8cb-74b2c,Uid:41b6dc6f-519b-4482-a5ad-eb2bf5a550b7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:41.712664 kubelet[2162]: E0702 07:57:41.712616 2162 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:41.712784 kubelet[2162]: E0702 07:57:41.712691 2162 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bf6c8cb-74b2c" Jul 2 07:57:41.712784 kubelet[2162]: E0702 07:57:41.712723 2162 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bf6c8cb-74b2c" Jul 2 07:57:41.712900 kubelet[2162]: E0702 07:57:41.712779 2162 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7bf6c8cb-74b2c_calico-system(41b6dc6f-519b-4482-a5ad-eb2bf5a550b7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7bf6c8cb-74b2c_calico-system(41b6dc6f-519b-4482-a5ad-eb2bf5a550b7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bf6c8cb-74b2c" podUID="41b6dc6f-519b-4482-a5ad-eb2bf5a550b7" Jul 2 07:57:41.715051 env[1237]: time="2024-07-02T07:57:41.714223458Z" level=error msg="Failed to destroy network for sandbox \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:41.715051 env[1237]: time="2024-07-02T07:57:41.714680523Z" level=error msg="encountered an error cleaning up failed sandbox \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:41.715051 env[1237]: time="2024-07-02T07:57:41.714750495Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xgqmj,Uid:dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:41.715313 kubelet[2162]: E0702 07:57:41.714943 2162 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:41.715313 kubelet[2162]: E0702 07:57:41.715006 2162 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-xgqmj" Jul 2 07:57:41.715313 kubelet[2162]: E0702 07:57:41.715035 2162 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-xgqmj" Jul 2 07:57:41.715579 kubelet[2162]: E0702 07:57:41.715086 2162 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-xgqmj_kube-system(dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-xgqmj_kube-system(dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-xgqmj" podUID="dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59" Jul 2 07:57:42.057127 kubelet[2162]: I0702 07:57:42.056985 2162 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Jul 2 07:57:42.059010 env[1237]: time="2024-07-02T07:57:42.058945300Z" level=info msg="StopPodSandbox for \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\"" Jul 2 07:57:42.060699 kubelet[2162]: I0702 07:57:42.060668 2162 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Jul 2 07:57:42.061303 env[1237]: time="2024-07-02T07:57:42.061270622Z" level=info msg="StopPodSandbox for \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\"" Jul 2 07:57:42.063157 kubelet[2162]: I0702 07:57:42.063127 2162 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Jul 2 07:57:42.063865 env[1237]: time="2024-07-02T07:57:42.063826715Z" level=info msg="StopPodSandbox for \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\"" Jul 2 07:57:42.076639 env[1237]: time="2024-07-02T07:57:42.076599353Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 07:57:42.085354 kubelet[2162]: I0702 07:57:42.085113 2162 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Jul 2 07:57:42.086089 env[1237]: time="2024-07-02T07:57:42.086044693Z" level=info msg="StopPodSandbox for \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\"" Jul 2 07:57:42.176791 env[1237]: time="2024-07-02T07:57:42.176705035Z" level=error msg="StopPodSandbox for \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\" failed" error="failed to destroy network for sandbox \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:42.177769 kubelet[2162]: E0702 07:57:42.177347 2162 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Jul 2 07:57:42.177769 kubelet[2162]: E0702 07:57:42.177486 2162 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb"} Jul 2 07:57:42.177769 kubelet[2162]: E0702 07:57:42.177631 2162 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:57:42.177769 kubelet[2162]: E0702 07:57:42.177695 2162 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wwmcp" podUID="d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73" Jul 2 07:57:42.189678 env[1237]: time="2024-07-02T07:57:42.189599268Z" level=error msg="StopPodSandbox for \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\" failed" error="failed to destroy network for sandbox \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:42.189904 kubelet[2162]: E0702 07:57:42.189859 2162 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Jul 2 07:57:42.190033 kubelet[2162]: E0702 07:57:42.189920 2162 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019"} Jul 2 07:57:42.190033 kubelet[2162]: E0702 07:57:42.189967 2162 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"41b6dc6f-519b-4482-a5ad-eb2bf5a550b7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:57:42.190033 kubelet[2162]: E0702 07:57:42.190009 2162 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"41b6dc6f-519b-4482-a5ad-eb2bf5a550b7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bf6c8cb-74b2c" podUID="41b6dc6f-519b-4482-a5ad-eb2bf5a550b7" Jul 2 07:57:42.192012 env[1237]: time="2024-07-02T07:57:42.191894793Z" level=error msg="StopPodSandbox for \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\" failed" error="failed to destroy network for sandbox \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:42.192219 kubelet[2162]: E0702 07:57:42.192178 2162 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Jul 2 07:57:42.192354 kubelet[2162]: E0702 07:57:42.192234 2162 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923"} Jul 2 07:57:42.192354 kubelet[2162]: E0702 07:57:42.192277 2162 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6e423b60-704e-420e-9590-f0e5b18595c2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:57:42.192354 kubelet[2162]: E0702 07:57:42.192315 2162 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6e423b60-704e-420e-9590-f0e5b18595c2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-cxbn9" podUID="6e423b60-704e-420e-9590-f0e5b18595c2" Jul 2 07:57:42.207330 env[1237]: time="2024-07-02T07:57:42.207252108Z" level=error msg="StopPodSandbox for \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\" failed" error="failed to destroy network for sandbox \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:57:42.207580 kubelet[2162]: E0702 07:57:42.207534 2162 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Jul 2 07:57:42.207710 kubelet[2162]: E0702 07:57:42.207596 2162 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5"} Jul 2 07:57:42.207777 kubelet[2162]: E0702 07:57:42.207699 2162 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:57:42.207777 kubelet[2162]: E0702 07:57:42.207746 2162 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-xgqmj" podUID="dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59" Jul 2 07:57:42.453952 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5-shm.mount: Deactivated successfully. Jul 2 07:57:42.454089 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019-shm.mount: Deactivated successfully. Jul 2 07:57:42.454189 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923-shm.mount: Deactivated successfully. Jul 2 07:57:48.292320 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount403862879.mount: Deactivated successfully. Jul 2 07:57:48.325022 env[1237]: time="2024-07-02T07:57:48.324938745Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:48.327751 env[1237]: time="2024-07-02T07:57:48.327707966Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:48.329986 env[1237]: time="2024-07-02T07:57:48.329941362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:48.332452 env[1237]: time="2024-07-02T07:57:48.332394442Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:48.333227 env[1237]: time="2024-07-02T07:57:48.333182424Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49\"" Jul 2 07:57:48.355491 env[1237]: time="2024-07-02T07:57:48.348200409Z" level=info msg="CreateContainer within sandbox \"6369cbeb00d987238446171f0ed4001a7e7fba2a5c9ca00139118e9095991e7c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 07:57:48.378887 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount16526954.mount: Deactivated successfully. Jul 2 07:57:48.379353 env[1237]: time="2024-07-02T07:57:48.379305226Z" level=info msg="CreateContainer within sandbox \"6369cbeb00d987238446171f0ed4001a7e7fba2a5c9ca00139118e9095991e7c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"584e6bac2109c77cd7db2e85785a9310738dc00b990d500fa153bbfb153eda68\"" Jul 2 07:57:48.382656 env[1237]: time="2024-07-02T07:57:48.382607529Z" level=info msg="StartContainer for \"584e6bac2109c77cd7db2e85785a9310738dc00b990d500fa153bbfb153eda68\"" Jul 2 07:57:48.410857 systemd[1]: Started cri-containerd-584e6bac2109c77cd7db2e85785a9310738dc00b990d500fa153bbfb153eda68.scope. Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.451619 kernel: kauditd_printk_skb: 34 callbacks suppressed Jul 2 07:57:48.451760 kernel: audit: type=1400 audit(1719907068.444:959): avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.507621 kernel: audit: type=1300 audit(1719907068.444:959): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f65ad729b18 items=0 ppid=2623 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.444000 audit[3047]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f65ad729b18 items=0 ppid=2623 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538346536626163323130396337376364376462326538353738356139 Jul 2 07:57:48.537536 kernel: audit: type=1327 audit(1719907068.444:959): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538346536626163323130396337376364376462326538353738356139 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.579856 kernel: audit: type=1400 audit(1719907068.444:960): avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.580008 kernel: audit: type=1400 audit(1719907068.444:960): avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.580495 kernel: audit: type=1400 audit(1719907068.444:960): avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.581753 env[1237]: time="2024-07-02T07:57:48.581698618Z" level=info msg="StartContainer for \"584e6bac2109c77cd7db2e85785a9310738dc00b990d500fa153bbfb153eda68\" returns successfully" Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.622054 kernel: audit: type=1400 audit(1719907068.444:960): avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.669284 kernel: audit: type=1400 audit(1719907068.444:960): avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.669414 kernel: audit: type=1400 audit(1719907068.444:960): avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.692535 kernel: audit: type=1400 audit(1719907068.444:960): avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit: BPF prog-id=142 op=LOAD Jul 2 07:57:48.444000 audit[3047]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00028a2d8 items=0 ppid=2623 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538346536626163323130396337376364376462326538353738356139 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit: BPF prog-id=143 op=LOAD Jul 2 07:57:48.444000 audit[3047]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00028a328 items=0 ppid=2623 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538346536626163323130396337376364376462326538353738356139 Jul 2 07:57:48.444000 audit: BPF prog-id=143 op=UNLOAD Jul 2 07:57:48.444000 audit: BPF prog-id=142 op=UNLOAD Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:48.444000 audit: BPF prog-id=144 op=LOAD Jul 2 07:57:48.444000 audit[3047]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00028a3b8 items=0 ppid=2623 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:48.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538346536626163323130396337376364376462326538353738356139 Jul 2 07:57:48.747841 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 07:57:48.748056 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 07:57:49.138009 kubelet[2162]: I0702 07:57:49.137920 2162 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-dpgz4" podStartSLOduration=2.265497959 podStartE2EDuration="19.137896186s" podCreationTimestamp="2024-07-02 07:57:30 +0000 UTC" firstStartedPulling="2024-07-02 07:57:31.462123768 +0000 UTC m=+21.847811178" lastFinishedPulling="2024-07-02 07:57:48.33452199 +0000 UTC m=+38.720209405" observedRunningTime="2024-07-02 07:57:49.135227158 +0000 UTC m=+39.520914578" watchObservedRunningTime="2024-07-02 07:57:49.137896186 +0000 UTC m=+39.523583603" Jul 2 07:57:50.147652 systemd[1]: run-containerd-runc-k8s.io-584e6bac2109c77cd7db2e85785a9310738dc00b990d500fa153bbfb153eda68-runc.ufn9IF.mount: Deactivated successfully. Jul 2 07:57:50.240000 audit[3175]: AVC avc: denied { write } for pid=3175 comm="tee" name="fd" dev="proc" ino=24643 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:57:50.240000 audit[3175]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd6d4299bc a2=241 a3=1b6 items=1 ppid=3142 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:50.240000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 07:57:50.240000 audit: PATH item=0 name="/dev/fd/63" inode=24625 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:50.240000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:57:50.260000 audit[3209]: AVC avc: denied { write } for pid=3209 comm="tee" name="fd" dev="proc" ino=24662 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:57:50.260000 audit[3209]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0886c9bd a2=241 a3=1b6 items=1 ppid=3150 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:50.260000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 07:57:50.260000 audit: PATH item=0 name="/dev/fd/63" inode=24353 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:50.260000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:57:50.280000 audit[3193]: AVC avc: denied { write } for pid=3193 comm="tee" name="fd" dev="proc" ino=24364 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:57:50.280000 audit[3193]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb90c69cc a2=241 a3=1b6 items=1 ppid=3141 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:50.280000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 07:57:50.280000 audit: PATH item=0 name="/dev/fd/63" inode=24344 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:50.280000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:57:50.286000 audit[3213]: AVC avc: denied { write } for pid=3213 comm="tee" name="fd" dev="proc" ino=24368 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:57:50.288000 audit[3196]: AVC avc: denied { write } for pid=3196 comm="tee" name="fd" dev="proc" ino=24371 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:57:50.291000 audit[3222]: AVC avc: denied { write } for pid=3222 comm="tee" name="fd" dev="proc" ino=24374 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:57:50.294000 audit[3198]: AVC avc: denied { write } for pid=3198 comm="tee" name="fd" dev="proc" ino=24375 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:57:50.294000 audit[3198]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff531379cd a2=241 a3=1b6 items=1 ppid=3149 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:50.288000 audit[3196]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff1208d9cc a2=241 a3=1b6 items=1 ppid=3151 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:50.288000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 07:57:50.288000 audit: PATH item=0 name="/dev/fd/63" inode=24349 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:50.288000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:57:50.294000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 07:57:50.294000 audit: PATH item=0 name="/dev/fd/63" inode=24352 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:50.294000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:57:50.286000 audit[3213]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffcb9e29cc a2=241 a3=1b6 items=1 ppid=3145 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:50.286000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 07:57:50.286000 audit: PATH item=0 name="/dev/fd/63" inode=24356 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:50.286000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:57:50.291000 audit[3222]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcefc619ce a2=241 a3=1b6 items=1 ppid=3139 pid=3222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:50.291000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 07:57:50.291000 audit: PATH item=0 name="/dev/fd/63" inode=24361 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:57:50.291000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:57:52.867380 env[1237]: time="2024-07-02T07:57:52.867316770Z" level=info msg="StopPodSandbox for \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\"" Jul 2 07:57:52.965728 env[1237]: 2024-07-02 07:57:52.919 [INFO][3288] k8s.go 608: Cleaning up netns ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Jul 2 07:57:52.965728 env[1237]: 2024-07-02 07:57:52.925 [INFO][3288] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" iface="eth0" netns="/var/run/netns/cni-d920b3e8-6325-2d29-28d2-920b43f464b5" Jul 2 07:57:52.965728 env[1237]: 2024-07-02 07:57:52.925 [INFO][3288] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" iface="eth0" netns="/var/run/netns/cni-d920b3e8-6325-2d29-28d2-920b43f464b5" Jul 2 07:57:52.965728 env[1237]: 2024-07-02 07:57:52.925 [INFO][3288] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" iface="eth0" netns="/var/run/netns/cni-d920b3e8-6325-2d29-28d2-920b43f464b5" Jul 2 07:57:52.965728 env[1237]: 2024-07-02 07:57:52.925 [INFO][3288] k8s.go 615: Releasing IP address(es) ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Jul 2 07:57:52.965728 env[1237]: 2024-07-02 07:57:52.925 [INFO][3288] utils.go 188: Calico CNI releasing IP address ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Jul 2 07:57:52.965728 env[1237]: 2024-07-02 07:57:52.953 [INFO][3294] ipam_plugin.go 411: Releasing address using handleID ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" HandleID="k8s-pod-network.09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" Jul 2 07:57:52.965728 env[1237]: 2024-07-02 07:57:52.954 [INFO][3294] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:52.965728 env[1237]: 2024-07-02 07:57:52.954 [INFO][3294] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:52.965728 env[1237]: 2024-07-02 07:57:52.961 [WARNING][3294] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" HandleID="k8s-pod-network.09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" Jul 2 07:57:52.965728 env[1237]: 2024-07-02 07:57:52.961 [INFO][3294] ipam_plugin.go 439: Releasing address using workloadID ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" HandleID="k8s-pod-network.09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" Jul 2 07:57:52.965728 env[1237]: 2024-07-02 07:57:52.963 [INFO][3294] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:52.965728 env[1237]: 2024-07-02 07:57:52.964 [INFO][3288] k8s.go 621: Teardown processing complete. ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Jul 2 07:57:52.968707 env[1237]: time="2024-07-02T07:57:52.968649468Z" level=info msg="TearDown network for sandbox \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\" successfully" Jul 2 07:57:52.968908 env[1237]: time="2024-07-02T07:57:52.968875048Z" level=info msg="StopPodSandbox for \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\" returns successfully" Jul 2 07:57:52.970059 env[1237]: time="2024-07-02T07:57:52.969986726Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xgqmj,Uid:dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59,Namespace:kube-system,Attempt:1,}" Jul 2 07:57:52.973148 systemd[1]: run-netns-cni\x2dd920b3e8\x2d6325\x2d2d29\x2d28d2\x2d920b43f464b5.mount: Deactivated successfully. Jul 2 07:57:53.130969 systemd-networkd[1034]: cali5ed674ebf08: Link UP Jul 2 07:57:53.146470 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:57:53.146652 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ed674ebf08: link becomes ready Jul 2 07:57:53.146808 systemd-networkd[1034]: cali5ed674ebf08: Gained carrier Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.025 [INFO][3300] utils.go 100: File /var/lib/calico/mtu does not exist Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.040 [INFO][3300] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0 coredns-7db6d8ff4d- kube-system dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59 682 0 2024-07-02 07:57:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal coredns-7db6d8ff4d-xgqmj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5ed674ebf08 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xgqmj" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-" Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.040 [INFO][3300] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xgqmj" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.078 [INFO][3312] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" HandleID="k8s-pod-network.d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.087 [INFO][3312] ipam_plugin.go 264: Auto assigning IP ContainerID="d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" HandleID="k8s-pod-network.d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031b300), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", "pod":"coredns-7db6d8ff4d-xgqmj", "timestamp":"2024-07-02 07:57:53.078083806 +0000 UTC"}, Hostname:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.087 [INFO][3312] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.087 [INFO][3312] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.087 [INFO][3312] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal' Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.089 [INFO][3312] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.093 [INFO][3312] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.097 [INFO][3312] ipam.go 489: Trying affinity for 192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.099 [INFO][3312] ipam.go 155: Attempting to load block cidr=192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.101 [INFO][3312] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.101 [INFO][3312] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.192/26 handle="k8s-pod-network.d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.102 [INFO][3312] ipam.go 1685: Creating new handle: k8s-pod-network.d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.106 [INFO][3312] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.192/26 handle="k8s-pod-network.d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.112 [INFO][3312] ipam.go 1216: Successfully claimed IPs: [192.168.123.193/26] block=192.168.123.192/26 handle="k8s-pod-network.d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.112 [INFO][3312] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.193/26] handle="k8s-pod-network.d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.113 [INFO][3312] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:53.170362 env[1237]: 2024-07-02 07:57:53.113 [INFO][3312] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.123.193/26] IPv6=[] ContainerID="d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" HandleID="k8s-pod-network.d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" Jul 2 07:57:53.171635 env[1237]: 2024-07-02 07:57:53.116 [INFO][3300] k8s.go 386: Populated endpoint ContainerID="d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xgqmj" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59", ResourceVersion:"682", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-7db6d8ff4d-xgqmj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5ed674ebf08", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:53.171635 env[1237]: 2024-07-02 07:57:53.117 [INFO][3300] k8s.go 387: Calico CNI using IPs: [192.168.123.193/32] ContainerID="d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xgqmj" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" Jul 2 07:57:53.171635 env[1237]: 2024-07-02 07:57:53.117 [INFO][3300] dataplane_linux.go 68: Setting the host side veth name to cali5ed674ebf08 ContainerID="d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xgqmj" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" Jul 2 07:57:53.171635 env[1237]: 2024-07-02 07:57:53.147 [INFO][3300] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xgqmj" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" Jul 2 07:57:53.171635 env[1237]: 2024-07-02 07:57:53.148 [INFO][3300] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xgqmj" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59", ResourceVersion:"682", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea", Pod:"coredns-7db6d8ff4d-xgqmj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5ed674ebf08", MAC:"da:8a:b7:e4:26:5b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:53.171635 env[1237]: 2024-07-02 07:57:53.164 [INFO][3300] k8s.go 500: Wrote updated endpoint to datastore ContainerID="d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xgqmj" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" Jul 2 07:57:53.195155 env[1237]: time="2024-07-02T07:57:53.195069797Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:53.195155 env[1237]: time="2024-07-02T07:57:53.195114351Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:53.195484 env[1237]: time="2024-07-02T07:57:53.195131627Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:53.196497 env[1237]: time="2024-07-02T07:57:53.195509973Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea pid=3339 runtime=io.containerd.runc.v2 Jul 2 07:57:53.229320 systemd[1]: run-containerd-runc-k8s.io-d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea-runc.p9WToT.mount: Deactivated successfully. Jul 2 07:57:53.238065 systemd[1]: Started cri-containerd-d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea.scope. Jul 2 07:57:53.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.255000 audit: BPF prog-id=145 op=LOAD Jul 2 07:57:53.256000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.256000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3339 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:53.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643332336130323066663937386565323733626261313365646135 Jul 2 07:57:53.256000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.256000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3339 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:53.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643332336130323066663937386565323733626261313365646135 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit: BPF prog-id=146 op=LOAD Jul 2 07:57:53.257000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000218370 items=0 ppid=3339 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:53.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643332336130323066663937386565323733626261313365646135 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.257000 audit: BPF prog-id=147 op=LOAD Jul 2 07:57:53.257000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002183b8 items=0 ppid=3339 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:53.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643332336130323066663937386565323733626261313365646135 Jul 2 07:57:53.258000 audit: BPF prog-id=147 op=UNLOAD Jul 2 07:57:53.258000 audit: BPF prog-id=146 op=UNLOAD Jul 2 07:57:53.258000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.258000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.258000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.258000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.258000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.258000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.258000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.258000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.258000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.258000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.258000 audit: BPF prog-id=148 op=LOAD Jul 2 07:57:53.258000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002187c8 items=0 ppid=3339 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:53.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643332336130323066663937386565323733626261313365646135 Jul 2 07:57:53.299911 env[1237]: time="2024-07-02T07:57:53.299857374Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xgqmj,Uid:dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59,Namespace:kube-system,Attempt:1,} returns sandbox id \"d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea\"" Jul 2 07:57:53.306290 env[1237]: time="2024-07-02T07:57:53.306030548Z" level=info msg="CreateContainer within sandbox \"d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 07:57:53.324963 env[1237]: time="2024-07-02T07:57:53.324901625Z" level=info msg="CreateContainer within sandbox \"d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c40458ca24346cf1744c19a36acd72fc30e401a78373fb72c242015be0623945\"" Jul 2 07:57:53.326759 env[1237]: time="2024-07-02T07:57:53.326705850Z" level=info msg="StartContainer for \"c40458ca24346cf1744c19a36acd72fc30e401a78373fb72c242015be0623945\"" Jul 2 07:57:53.348893 systemd[1]: Started cri-containerd-c40458ca24346cf1744c19a36acd72fc30e401a78373fb72c242015be0623945.scope. Jul 2 07:57:53.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.371000 audit: BPF prog-id=149 op=LOAD Jul 2 07:57:53.372000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.372000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3339 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:53.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334303435386361323433343663663137343463313961333661636437 Jul 2 07:57:53.372000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.372000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3339 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:53.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334303435386361323433343663663137343463313961333661636437 Jul 2 07:57:53.372000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.372000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.372000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.372000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.372000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.372000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.372000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.372000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.372000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.372000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.372000 audit: BPF prog-id=150 op=LOAD Jul 2 07:57:53.372000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00024eaf0 items=0 ppid=3339 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:53.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334303435386361323433343663663137343463313961333661636437 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit: BPF prog-id=151 op=LOAD Jul 2 07:57:53.373000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00024eb38 items=0 ppid=3339 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:53.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334303435386361323433343663663137343463313961333661636437 Jul 2 07:57:53.373000 audit: BPF prog-id=151 op=UNLOAD Jul 2 07:57:53.373000 audit: BPF prog-id=150 op=UNLOAD Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:53.373000 audit: BPF prog-id=152 op=LOAD Jul 2 07:57:53.373000 audit[3381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00024ef48 items=0 ppid=3339 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:53.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334303435386361323433343663663137343463313961333661636437 Jul 2 07:57:53.401217 env[1237]: time="2024-07-02T07:57:53.401157486Z" level=info msg="StartContainer for \"c40458ca24346cf1744c19a36acd72fc30e401a78373fb72c242015be0623945\" returns successfully" Jul 2 07:57:54.132209 kubelet[2162]: I0702 07:57:54.132123 2162 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-xgqmj" podStartSLOduration=30.132096733 podStartE2EDuration="30.132096733s" podCreationTimestamp="2024-07-02 07:57:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:57:54.130909732 +0000 UTC m=+44.516597153" watchObservedRunningTime="2024-07-02 07:57:54.132096733 +0000 UTC m=+44.517784153" Jul 2 07:57:54.157000 audit[3430]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=3430 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:54.165111 kernel: kauditd_printk_skb: 182 callbacks suppressed Jul 2 07:57:54.165252 kernel: audit: type=1325 audit(1719907074.157:1008): table=filter:95 family=2 entries=16 op=nft_register_rule pid=3430 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:54.157000 audit[3430]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff8e46d950 a2=0 a3=7fff8e46d93c items=0 ppid=2344 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:54.217453 kernel: audit: type=1300 audit(1719907074.157:1008): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff8e46d950 a2=0 a3=7fff8e46d93c items=0 ppid=2344 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:54.217632 kernel: audit: type=1327 audit(1719907074.157:1008): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:54.157000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:54.218000 audit[3430]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=3430 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:54.249367 kernel: audit: type=1325 audit(1719907074.218:1009): table=nat:96 family=2 entries=12 op=nft_register_rule pid=3430 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:54.218000 audit[3430]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff8e46d950 a2=0 a3=0 items=0 ppid=2344 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:54.218000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:54.297537 kernel: audit: type=1300 audit(1719907074.218:1009): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff8e46d950 a2=0 a3=0 items=0 ppid=2344 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:54.297723 kernel: audit: type=1327 audit(1719907074.218:1009): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:54.230000 audit[3432]: NETFILTER_CFG table=filter:97 family=2 entries=13 op=nft_register_rule pid=3432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:54.317499 kernel: audit: type=1325 audit(1719907074.230:1010): table=filter:97 family=2 entries=13 op=nft_register_rule pid=3432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:54.317645 kernel: audit: type=1300 audit(1719907074.230:1010): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff92554a20 a2=0 a3=7fff92554a0c items=0 ppid=2344 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:54.230000 audit[3432]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff92554a20 a2=0 a3=7fff92554a0c items=0 ppid=2344 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:54.315940 systemd-networkd[1034]: cali5ed674ebf08: Gained IPv6LL Jul 2 07:57:54.230000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:54.365703 kernel: audit: type=1327 audit(1719907074.230:1010): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:54.298000 audit[3432]: NETFILTER_CFG table=nat:98 family=2 entries=33 op=nft_register_chain pid=3432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:54.298000 audit[3432]: SYSCALL arch=c000003e syscall=46 success=yes exit=13428 a0=3 a1=7fff92554a20 a2=0 a3=7fff92554a0c items=0 ppid=2344 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:54.382619 kernel: audit: type=1325 audit(1719907074.298:1011): table=nat:98 family=2 entries=33 op=nft_register_chain pid=3432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:54.298000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:54.867650 env[1237]: time="2024-07-02T07:57:54.867595565Z" level=info msg="StopPodSandbox for \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\"" Jul 2 07:57:55.023614 env[1237]: 2024-07-02 07:57:54.960 [INFO][3458] k8s.go 608: Cleaning up netns ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Jul 2 07:57:55.023614 env[1237]: 2024-07-02 07:57:54.960 [INFO][3458] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" iface="eth0" netns="/var/run/netns/cni-edc543cd-6eef-9b28-9652-99b1c11c3881" Jul 2 07:57:55.023614 env[1237]: 2024-07-02 07:57:54.961 [INFO][3458] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" iface="eth0" netns="/var/run/netns/cni-edc543cd-6eef-9b28-9652-99b1c11c3881" Jul 2 07:57:55.023614 env[1237]: 2024-07-02 07:57:54.961 [INFO][3458] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" iface="eth0" netns="/var/run/netns/cni-edc543cd-6eef-9b28-9652-99b1c11c3881" Jul 2 07:57:55.023614 env[1237]: 2024-07-02 07:57:54.961 [INFO][3458] k8s.go 615: Releasing IP address(es) ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Jul 2 07:57:55.023614 env[1237]: 2024-07-02 07:57:54.961 [INFO][3458] utils.go 188: Calico CNI releasing IP address ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Jul 2 07:57:55.023614 env[1237]: 2024-07-02 07:57:55.003 [INFO][3473] ipam_plugin.go 411: Releasing address using handleID ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" HandleID="k8s-pod-network.8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" Jul 2 07:57:55.023614 env[1237]: 2024-07-02 07:57:55.004 [INFO][3473] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:55.023614 env[1237]: 2024-07-02 07:57:55.004 [INFO][3473] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:55.023614 env[1237]: 2024-07-02 07:57:55.019 [WARNING][3473] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" HandleID="k8s-pod-network.8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" Jul 2 07:57:55.023614 env[1237]: 2024-07-02 07:57:55.019 [INFO][3473] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" HandleID="k8s-pod-network.8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" Jul 2 07:57:55.023614 env[1237]: 2024-07-02 07:57:55.021 [INFO][3473] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:55.023614 env[1237]: 2024-07-02 07:57:55.022 [INFO][3458] k8s.go 621: Teardown processing complete. ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Jul 2 07:57:55.028553 systemd[1]: run-netns-cni\x2dedc543cd\x2d6eef\x2d9b28\x2d9652\x2d99b1c11c3881.mount: Deactivated successfully. Jul 2 07:57:55.029117 env[1237]: time="2024-07-02T07:57:55.029066304Z" level=info msg="TearDown network for sandbox \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\" successfully" Jul 2 07:57:55.029282 env[1237]: time="2024-07-02T07:57:55.029253575Z" level=info msg="StopPodSandbox for \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\" returns successfully" Jul 2 07:57:55.030276 env[1237]: time="2024-07-02T07:57:55.030240376Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wwmcp,Uid:d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73,Namespace:calico-system,Attempt:1,}" Jul 2 07:57:55.218790 systemd-networkd[1034]: cali56dbd545462: Link UP Jul 2 07:57:55.227491 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:57:55.236550 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali56dbd545462: link becomes ready Jul 2 07:57:55.238337 systemd-networkd[1034]: cali56dbd545462: Gained carrier Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.096 [INFO][3481] utils.go 100: File /var/lib/calico/mtu does not exist Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.112 [INFO][3481] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0 csi-node-driver- calico-system d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73 701 0 2024-07-02 07:57:31 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6cc9df58f4 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal csi-node-driver-wwmcp eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali56dbd545462 [] []}} ContainerID="65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" Namespace="calico-system" Pod="csi-node-driver-wwmcp" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-" Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.112 [INFO][3481] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" Namespace="calico-system" Pod="csi-node-driver-wwmcp" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.167 [INFO][3493] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" HandleID="k8s-pod-network.65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.179 [INFO][3493] ipam_plugin.go 264: Auto assigning IP ContainerID="65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" HandleID="k8s-pod-network.65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5a70), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", "pod":"csi-node-driver-wwmcp", "timestamp":"2024-07-02 07:57:55.167103915 +0000 UTC"}, Hostname:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.179 [INFO][3493] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.179 [INFO][3493] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.179 [INFO][3493] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal' Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.184 [INFO][3493] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.192 [INFO][3493] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.196 [INFO][3493] ipam.go 489: Trying affinity for 192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.198 [INFO][3493] ipam.go 155: Attempting to load block cidr=192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.200 [INFO][3493] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.200 [INFO][3493] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.192/26 handle="k8s-pod-network.65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.202 [INFO][3493] ipam.go 1685: Creating new handle: k8s-pod-network.65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637 Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.205 [INFO][3493] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.192/26 handle="k8s-pod-network.65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.210 [INFO][3493] ipam.go 1216: Successfully claimed IPs: [192.168.123.194/26] block=192.168.123.192/26 handle="k8s-pod-network.65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.210 [INFO][3493] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.194/26] handle="k8s-pod-network.65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.210 [INFO][3493] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:55.249708 env[1237]: 2024-07-02 07:57:55.210 [INFO][3493] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.123.194/26] IPv6=[] ContainerID="65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" HandleID="k8s-pod-network.65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" Jul 2 07:57:55.251002 env[1237]: 2024-07-02 07:57:55.212 [INFO][3481] k8s.go 386: Populated endpoint ContainerID="65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" Namespace="calico-system" Pod="csi-node-driver-wwmcp" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-wwmcp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.123.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali56dbd545462", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:55.251002 env[1237]: 2024-07-02 07:57:55.212 [INFO][3481] k8s.go 387: Calico CNI using IPs: [192.168.123.194/32] ContainerID="65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" Namespace="calico-system" Pod="csi-node-driver-wwmcp" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" Jul 2 07:57:55.251002 env[1237]: 2024-07-02 07:57:55.213 [INFO][3481] dataplane_linux.go 68: Setting the host side veth name to cali56dbd545462 ContainerID="65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" Namespace="calico-system" Pod="csi-node-driver-wwmcp" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" Jul 2 07:57:55.251002 env[1237]: 2024-07-02 07:57:55.236 [INFO][3481] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" Namespace="calico-system" Pod="csi-node-driver-wwmcp" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" Jul 2 07:57:55.251002 env[1237]: 2024-07-02 07:57:55.237 [INFO][3481] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" Namespace="calico-system" Pod="csi-node-driver-wwmcp" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637", Pod:"csi-node-driver-wwmcp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.123.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali56dbd545462", MAC:"36:e8:34:ed:74:82", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:55.251002 env[1237]: 2024-07-02 07:57:55.248 [INFO][3481] k8s.go 500: Wrote updated endpoint to datastore ContainerID="65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637" Namespace="calico-system" Pod="csi-node-driver-wwmcp" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" Jul 2 07:57:55.270245 env[1237]: time="2024-07-02T07:57:55.270129823Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:55.270546 env[1237]: time="2024-07-02T07:57:55.270488425Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:55.270546 env[1237]: time="2024-07-02T07:57:55.270520380Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:55.270998 env[1237]: time="2024-07-02T07:57:55.270901262Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637 pid=3520 runtime=io.containerd.runc.v2 Jul 2 07:57:55.295896 systemd[1]: Started cri-containerd-65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637.scope. Jul 2 07:57:55.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.317000 audit: BPF prog-id=153 op=LOAD Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3520 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:55.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616337343835646137393233666532346561346565663736323737 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3520 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:55.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616337343835646137393233666532346561346565663736323737 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit: BPF prog-id=154 op=LOAD Jul 2 07:57:55.318000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000292520 items=0 ppid=3520 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:55.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616337343835646137393233666532346561346565663736323737 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit: BPF prog-id=155 op=LOAD Jul 2 07:57:55.318000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000292568 items=0 ppid=3520 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:55.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616337343835646137393233666532346561346565663736323737 Jul 2 07:57:55.318000 audit: BPF prog-id=155 op=UNLOAD Jul 2 07:57:55.318000 audit: BPF prog-id=154 op=UNLOAD Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:55.318000 audit: BPF prog-id=156 op=LOAD Jul 2 07:57:55.318000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000292978 items=0 ppid=3520 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:55.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616337343835646137393233666532346561346565663736323737 Jul 2 07:57:55.338342 env[1237]: time="2024-07-02T07:57:55.338270449Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wwmcp,Uid:d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73,Namespace:calico-system,Attempt:1,} returns sandbox id \"65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637\"" Jul 2 07:57:55.343739 env[1237]: time="2024-07-02T07:57:55.343677686Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 07:57:55.869117 env[1237]: time="2024-07-02T07:57:55.869069500Z" level=info msg="StopPodSandbox for \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\"" Jul 2 07:57:56.001279 env[1237]: 2024-07-02 07:57:55.933 [INFO][3567] k8s.go 608: Cleaning up netns ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Jul 2 07:57:56.001279 env[1237]: 2024-07-02 07:57:55.933 [INFO][3567] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" iface="eth0" netns="/var/run/netns/cni-229d66cc-2e59-572d-8608-67acbb038ab8" Jul 2 07:57:56.001279 env[1237]: 2024-07-02 07:57:55.934 [INFO][3567] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" iface="eth0" netns="/var/run/netns/cni-229d66cc-2e59-572d-8608-67acbb038ab8" Jul 2 07:57:56.001279 env[1237]: 2024-07-02 07:57:55.934 [INFO][3567] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" iface="eth0" netns="/var/run/netns/cni-229d66cc-2e59-572d-8608-67acbb038ab8" Jul 2 07:57:56.001279 env[1237]: 2024-07-02 07:57:55.934 [INFO][3567] k8s.go 615: Releasing IP address(es) ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Jul 2 07:57:56.001279 env[1237]: 2024-07-02 07:57:55.934 [INFO][3567] utils.go 188: Calico CNI releasing IP address ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Jul 2 07:57:56.001279 env[1237]: 2024-07-02 07:57:55.982 [INFO][3578] ipam_plugin.go 411: Releasing address using handleID ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" HandleID="k8s-pod-network.b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" Jul 2 07:57:56.001279 env[1237]: 2024-07-02 07:57:55.983 [INFO][3578] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:56.001279 env[1237]: 2024-07-02 07:57:55.983 [INFO][3578] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:56.001279 env[1237]: 2024-07-02 07:57:55.995 [WARNING][3578] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" HandleID="k8s-pod-network.b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" Jul 2 07:57:56.001279 env[1237]: 2024-07-02 07:57:55.995 [INFO][3578] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" HandleID="k8s-pod-network.b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" Jul 2 07:57:56.001279 env[1237]: 2024-07-02 07:57:55.998 [INFO][3578] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:56.001279 env[1237]: 2024-07-02 07:57:55.999 [INFO][3567] k8s.go 621: Teardown processing complete. ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Jul 2 07:57:56.002359 env[1237]: time="2024-07-02T07:57:56.001628425Z" level=info msg="TearDown network for sandbox \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\" successfully" Jul 2 07:57:56.002359 env[1237]: time="2024-07-02T07:57:56.001677573Z" level=info msg="StopPodSandbox for \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\" returns successfully" Jul 2 07:57:56.002913 env[1237]: time="2024-07-02T07:57:56.002519804Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bf6c8cb-74b2c,Uid:41b6dc6f-519b-4482-a5ad-eb2bf5a550b7,Namespace:calico-system,Attempt:1,}" Jul 2 07:57:56.031020 systemd[1]: run-netns-cni\x2d229d66cc\x2d2e59\x2d572d\x2d8608\x2d67acbb038ab8.mount: Deactivated successfully. Jul 2 07:57:56.278799 systemd-networkd[1034]: cali69fc1473e4f: Link UP Jul 2 07:57:56.292240 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:57:56.301499 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali69fc1473e4f: link becomes ready Jul 2 07:57:56.305544 systemd-networkd[1034]: cali69fc1473e4f: Gained carrier Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.072 [INFO][3586] utils.go 100: File /var/lib/calico/mtu does not exist Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.099 [INFO][3586] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0 calico-kube-controllers-7bf6c8cb- calico-system 41b6dc6f-519b-4482-a5ad-eb2bf5a550b7 707 0 2024-07-02 07:57:31 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7bf6c8cb projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal calico-kube-controllers-7bf6c8cb-74b2c eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali69fc1473e4f [] []}} ContainerID="c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" Namespace="calico-system" Pod="calico-kube-controllers-7bf6c8cb-74b2c" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-" Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.099 [INFO][3586] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" Namespace="calico-system" Pod="calico-kube-controllers-7bf6c8cb-74b2c" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.205 [INFO][3607] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" HandleID="k8s-pod-network.c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.215 [INFO][3607] ipam_plugin.go 264: Auto assigning IP ContainerID="c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" HandleID="k8s-pod-network.c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003445e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", "pod":"calico-kube-controllers-7bf6c8cb-74b2c", "timestamp":"2024-07-02 07:57:56.205059956 +0000 UTC"}, Hostname:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.215 [INFO][3607] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.215 [INFO][3607] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.216 [INFO][3607] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal' Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.218 [INFO][3607] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.224 [INFO][3607] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.238 [INFO][3607] ipam.go 489: Trying affinity for 192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.241 [INFO][3607] ipam.go 155: Attempting to load block cidr=192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.247 [INFO][3607] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.247 [INFO][3607] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.192/26 handle="k8s-pod-network.c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.249 [INFO][3607] ipam.go 1685: Creating new handle: k8s-pod-network.c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.257 [INFO][3607] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.192/26 handle="k8s-pod-network.c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.266 [INFO][3607] ipam.go 1216: Successfully claimed IPs: [192.168.123.195/26] block=192.168.123.192/26 handle="k8s-pod-network.c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.266 [INFO][3607] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.195/26] handle="k8s-pod-network.c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.267 [INFO][3607] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:56.326450 env[1237]: 2024-07-02 07:57:56.267 [INFO][3607] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.123.195/26] IPv6=[] ContainerID="c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" HandleID="k8s-pod-network.c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" Jul 2 07:57:56.327908 env[1237]: 2024-07-02 07:57:56.270 [INFO][3586] k8s.go 386: Populated endpoint ContainerID="c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" Namespace="calico-system" Pod="calico-kube-controllers-7bf6c8cb-74b2c" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0", GenerateName:"calico-kube-controllers-7bf6c8cb-", Namespace:"calico-system", SelfLink:"", UID:"41b6dc6f-519b-4482-a5ad-eb2bf5a550b7", ResourceVersion:"707", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bf6c8cb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-7bf6c8cb-74b2c", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.123.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali69fc1473e4f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:56.327908 env[1237]: 2024-07-02 07:57:56.271 [INFO][3586] k8s.go 387: Calico CNI using IPs: [192.168.123.195/32] ContainerID="c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" Namespace="calico-system" Pod="calico-kube-controllers-7bf6c8cb-74b2c" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" Jul 2 07:57:56.327908 env[1237]: 2024-07-02 07:57:56.271 [INFO][3586] dataplane_linux.go 68: Setting the host side veth name to cali69fc1473e4f ContainerID="c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" Namespace="calico-system" Pod="calico-kube-controllers-7bf6c8cb-74b2c" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" Jul 2 07:57:56.327908 env[1237]: 2024-07-02 07:57:56.311 [INFO][3586] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" Namespace="calico-system" Pod="calico-kube-controllers-7bf6c8cb-74b2c" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" Jul 2 07:57:56.327908 env[1237]: 2024-07-02 07:57:56.311 [INFO][3586] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" Namespace="calico-system" Pod="calico-kube-controllers-7bf6c8cb-74b2c" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0", GenerateName:"calico-kube-controllers-7bf6c8cb-", Namespace:"calico-system", SelfLink:"", UID:"41b6dc6f-519b-4482-a5ad-eb2bf5a550b7", ResourceVersion:"707", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bf6c8cb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e", Pod:"calico-kube-controllers-7bf6c8cb-74b2c", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.123.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali69fc1473e4f", MAC:"7a:9f:a8:03:ba:a3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:56.327908 env[1237]: 2024-07-02 07:57:56.321 [INFO][3586] k8s.go 500: Wrote updated endpoint to datastore ContainerID="c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e" Namespace="calico-system" Pod="calico-kube-controllers-7bf6c8cb-74b2c" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" Jul 2 07:57:56.388753 env[1237]: time="2024-07-02T07:57:56.388634474Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:56.388753 env[1237]: time="2024-07-02T07:57:56.388692469Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:56.388753 env[1237]: time="2024-07-02T07:57:56.388713517Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:56.389396 env[1237]: time="2024-07-02T07:57:56.389240198Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e pid=3638 runtime=io.containerd.runc.v2 Jul 2 07:57:56.440572 systemd[1]: Started cri-containerd-c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e.scope. Jul 2 07:57:56.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.479000 audit: BPF prog-id=157 op=LOAD Jul 2 07:57:56.480000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.480000 audit[3649]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3638 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:56.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335663764303130323230303433623031646530623865656661663662 Jul 2 07:57:56.480000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.480000 audit[3649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3638 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:56.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335663764303130323230303433623031646530623865656661663662 Jul 2 07:57:56.480000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.480000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.480000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.480000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.480000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.480000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.480000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.480000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.480000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.480000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.480000 audit: BPF prog-id=158 op=LOAD Jul 2 07:57:56.480000 audit[3649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028c350 items=0 ppid=3638 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:56.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335663764303130323230303433623031646530623865656661663662 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit: BPF prog-id=159 op=LOAD Jul 2 07:57:56.481000 audit[3649]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028c398 items=0 ppid=3638 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:56.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335663764303130323230303433623031646530623865656661663662 Jul 2 07:57:56.481000 audit: BPF prog-id=159 op=UNLOAD Jul 2 07:57:56.481000 audit: BPF prog-id=158 op=UNLOAD Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { perfmon } for pid=3649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit[3649]: AVC avc: denied { bpf } for pid=3649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.481000 audit: BPF prog-id=160 op=LOAD Jul 2 07:57:56.481000 audit[3649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028c7a8 items=0 ppid=3638 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:56.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335663764303130323230303433623031646530623865656661663662 Jul 2 07:57:56.536098 env[1237]: time="2024-07-02T07:57:56.532363657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bf6c8cb-74b2c,Uid:41b6dc6f-519b-4482-a5ad-eb2bf5a550b7,Namespace:calico-system,Attempt:1,} returns sandbox id \"c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e\"" Jul 2 07:57:56.582541 env[1237]: time="2024-07-02T07:57:56.582476928Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:56.585417 env[1237]: time="2024-07-02T07:57:56.585370939Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:56.587891 env[1237]: time="2024-07-02T07:57:56.587850258Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:56.590110 env[1237]: time="2024-07-02T07:57:56.590066168Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:56.590952 env[1237]: time="2024-07-02T07:57:56.590912245Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de\"" Jul 2 07:57:56.595322 env[1237]: time="2024-07-02T07:57:56.595282415Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\"" Jul 2 07:57:56.597335 env[1237]: time="2024-07-02T07:57:56.597294984Z" level=info msg="CreateContainer within sandbox \"65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 07:57:56.621501 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2150109633.mount: Deactivated successfully. Jul 2 07:57:56.626468 env[1237]: time="2024-07-02T07:57:56.626397736Z" level=info msg="CreateContainer within sandbox \"65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e069589013622924fb1095286bc4928b8b569341f4caebebddcd756beb59b78c\"" Jul 2 07:57:56.628779 env[1237]: time="2024-07-02T07:57:56.628742283Z" level=info msg="StartContainer for \"e069589013622924fb1095286bc4928b8b569341f4caebebddcd756beb59b78c\"" Jul 2 07:57:56.653718 systemd[1]: Started cri-containerd-e069589013622924fb1095286bc4928b8b569341f4caebebddcd756beb59b78c.scope. Jul 2 07:57:56.694000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.694000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f2b486bf518 items=0 ppid=3520 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:56.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530363935383930313336323239323466623130393532383662633439 Jul 2 07:57:56.694000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.694000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.694000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.694000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.694000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.694000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.694000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.694000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.694000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.694000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.694000 audit: BPF prog-id=161 op=LOAD Jul 2 07:57:56.694000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000259ba8 items=0 ppid=3520 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:56.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530363935383930313336323239323466623130393532383662633439 Jul 2 07:57:56.696000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.696000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.696000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.696000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.696000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.696000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.696000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.696000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.696000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.696000 audit: BPF prog-id=162 op=LOAD Jul 2 07:57:56.696000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000259bf8 items=0 ppid=3520 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:56.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530363935383930313336323239323466623130393532383662633439 Jul 2 07:57:56.697000 audit: BPF prog-id=162 op=UNLOAD Jul 2 07:57:56.697000 audit: BPF prog-id=161 op=UNLOAD Jul 2 07:57:56.697000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.697000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.697000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.697000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.697000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.697000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.697000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.697000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.697000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.697000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:56.697000 audit: BPF prog-id=163 op=LOAD Jul 2 07:57:56.697000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000259c88 items=0 ppid=3520 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:56.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530363935383930313336323239323466623130393532383662633439 Jul 2 07:57:56.724694 env[1237]: time="2024-07-02T07:57:56.724636666Z" level=info msg="StartContainer for \"e069589013622924fb1095286bc4928b8b569341f4caebebddcd756beb59b78c\" returns successfully" Jul 2 07:57:56.867483 env[1237]: time="2024-07-02T07:57:56.867009848Z" level=info msg="StopPodSandbox for \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\"" Jul 2 07:57:56.962487 env[1237]: 2024-07-02 07:57:56.923 [INFO][3724] k8s.go 608: Cleaning up netns ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Jul 2 07:57:56.962487 env[1237]: 2024-07-02 07:57:56.924 [INFO][3724] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" iface="eth0" netns="/var/run/netns/cni-9bb57bf6-dd73-24b5-9510-252e826e6f58" Jul 2 07:57:56.962487 env[1237]: 2024-07-02 07:57:56.924 [INFO][3724] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" iface="eth0" netns="/var/run/netns/cni-9bb57bf6-dd73-24b5-9510-252e826e6f58" Jul 2 07:57:56.962487 env[1237]: 2024-07-02 07:57:56.924 [INFO][3724] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" iface="eth0" netns="/var/run/netns/cni-9bb57bf6-dd73-24b5-9510-252e826e6f58" Jul 2 07:57:56.962487 env[1237]: 2024-07-02 07:57:56.924 [INFO][3724] k8s.go 615: Releasing IP address(es) ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Jul 2 07:57:56.962487 env[1237]: 2024-07-02 07:57:56.924 [INFO][3724] utils.go 188: Calico CNI releasing IP address ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Jul 2 07:57:56.962487 env[1237]: 2024-07-02 07:57:56.951 [INFO][3730] ipam_plugin.go 411: Releasing address using handleID ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" HandleID="k8s-pod-network.aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" Jul 2 07:57:56.962487 env[1237]: 2024-07-02 07:57:56.952 [INFO][3730] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:56.962487 env[1237]: 2024-07-02 07:57:56.952 [INFO][3730] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:56.962487 env[1237]: 2024-07-02 07:57:56.958 [WARNING][3730] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" HandleID="k8s-pod-network.aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" Jul 2 07:57:56.962487 env[1237]: 2024-07-02 07:57:56.958 [INFO][3730] ipam_plugin.go 439: Releasing address using workloadID ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" HandleID="k8s-pod-network.aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" Jul 2 07:57:56.962487 env[1237]: 2024-07-02 07:57:56.960 [INFO][3730] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:56.962487 env[1237]: 2024-07-02 07:57:56.961 [INFO][3724] k8s.go 621: Teardown processing complete. ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Jul 2 07:57:56.963755 env[1237]: time="2024-07-02T07:57:56.962709525Z" level=info msg="TearDown network for sandbox \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\" successfully" Jul 2 07:57:56.963755 env[1237]: time="2024-07-02T07:57:56.962754781Z" level=info msg="StopPodSandbox for \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\" returns successfully" Jul 2 07:57:56.963755 env[1237]: time="2024-07-02T07:57:56.963630135Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-cxbn9,Uid:6e423b60-704e-420e-9590-f0e5b18595c2,Namespace:kube-system,Attempt:1,}" Jul 2 07:57:57.032540 systemd[1]: run-netns-cni\x2d9bb57bf6\x2ddd73\x2d24b5\x2d9510\x2d252e826e6f58.mount: Deactivated successfully. Jul 2 07:57:57.148866 systemd-networkd[1034]: calic5499d70949: Link UP Jul 2 07:57:57.155926 systemd-networkd[1034]: calic5499d70949: Gained carrier Jul 2 07:57:57.157050 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic5499d70949: link becomes ready Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.010 [INFO][3737] utils.go 100: File /var/lib/calico/mtu does not exist Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.042 [INFO][3737] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0 coredns-7db6d8ff4d- kube-system 6e423b60-704e-420e-9590-f0e5b18595c2 720 0 2024-07-02 07:57:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal coredns-7db6d8ff4d-cxbn9 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calic5499d70949 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" Namespace="kube-system" Pod="coredns-7db6d8ff4d-cxbn9" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-" Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.042 [INFO][3737] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" Namespace="kube-system" Pod="coredns-7db6d8ff4d-cxbn9" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.096 [INFO][3755] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" HandleID="k8s-pod-network.9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.110 [INFO][3755] ipam_plugin.go 264: Auto assigning IP ContainerID="9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" HandleID="k8s-pod-network.9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000265130), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", "pod":"coredns-7db6d8ff4d-cxbn9", "timestamp":"2024-07-02 07:57:57.096382818 +0000 UTC"}, Hostname:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.110 [INFO][3755] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.111 [INFO][3755] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.111 [INFO][3755] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal' Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.113 [INFO][3755] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.117 [INFO][3755] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.122 [INFO][3755] ipam.go 489: Trying affinity for 192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.124 [INFO][3755] ipam.go 155: Attempting to load block cidr=192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.126 [INFO][3755] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.126 [INFO][3755] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.192/26 handle="k8s-pod-network.9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.132 [INFO][3755] ipam.go 1685: Creating new handle: k8s-pod-network.9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61 Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.137 [INFO][3755] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.192/26 handle="k8s-pod-network.9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.142 [INFO][3755] ipam.go 1216: Successfully claimed IPs: [192.168.123.196/26] block=192.168.123.192/26 handle="k8s-pod-network.9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.143 [INFO][3755] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.196/26] handle="k8s-pod-network.9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.143 [INFO][3755] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:57.186740 env[1237]: 2024-07-02 07:57:57.143 [INFO][3755] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.123.196/26] IPv6=[] ContainerID="9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" HandleID="k8s-pod-network.9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" Jul 2 07:57:57.188038 env[1237]: 2024-07-02 07:57:57.146 [INFO][3737] k8s.go 386: Populated endpoint ContainerID="9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" Namespace="kube-system" Pod="coredns-7db6d8ff4d-cxbn9" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"6e423b60-704e-420e-9590-f0e5b18595c2", ResourceVersion:"720", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-7db6d8ff4d-cxbn9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic5499d70949", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:57.188038 env[1237]: 2024-07-02 07:57:57.146 [INFO][3737] k8s.go 387: Calico CNI using IPs: [192.168.123.196/32] ContainerID="9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" Namespace="kube-system" Pod="coredns-7db6d8ff4d-cxbn9" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" Jul 2 07:57:57.188038 env[1237]: 2024-07-02 07:57:57.146 [INFO][3737] dataplane_linux.go 68: Setting the host side veth name to calic5499d70949 ContainerID="9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" Namespace="kube-system" Pod="coredns-7db6d8ff4d-cxbn9" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" Jul 2 07:57:57.188038 env[1237]: 2024-07-02 07:57:57.157 [INFO][3737] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" Namespace="kube-system" Pod="coredns-7db6d8ff4d-cxbn9" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" Jul 2 07:57:57.188038 env[1237]: 2024-07-02 07:57:57.158 [INFO][3737] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" Namespace="kube-system" Pod="coredns-7db6d8ff4d-cxbn9" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"6e423b60-704e-420e-9590-f0e5b18595c2", ResourceVersion:"720", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61", Pod:"coredns-7db6d8ff4d-cxbn9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic5499d70949", MAC:"9a:d1:3f:63:4f:6d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:57.188038 env[1237]: 2024-07-02 07:57:57.182 [INFO][3737] k8s.go 500: Wrote updated endpoint to datastore ContainerID="9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61" Namespace="kube-system" Pod="coredns-7db6d8ff4d-cxbn9" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" Jul 2 07:57:57.192184 systemd-networkd[1034]: cali56dbd545462: Gained IPv6LL Jul 2 07:57:57.216839 env[1237]: time="2024-07-02T07:57:57.216409998Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:57.216839 env[1237]: time="2024-07-02T07:57:57.216517823Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:57.216839 env[1237]: time="2024-07-02T07:57:57.216537955Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:57.217250 env[1237]: time="2024-07-02T07:57:57.217103251Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61 pid=3786 runtime=io.containerd.runc.v2 Jul 2 07:57:57.251168 systemd[1]: Started cri-containerd-9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61.scope. Jul 2 07:57:57.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.280000 audit: BPF prog-id=164 op=LOAD Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3786 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:57.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936343466643531643066666533643331316233333666663162646537 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3786 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:57.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936343466643531643066666533643331316233333666663162646537 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit: BPF prog-id=165 op=LOAD Jul 2 07:57:57.281000 audit[3796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000291270 items=0 ppid=3786 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:57.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936343466643531643066666533643331316233333666663162646537 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit: BPF prog-id=166 op=LOAD Jul 2 07:57:57.281000 audit[3796]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002912b8 items=0 ppid=3786 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:57.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936343466643531643066666533643331316233333666663162646537 Jul 2 07:57:57.281000 audit: BPF prog-id=166 op=UNLOAD Jul 2 07:57:57.281000 audit: BPF prog-id=165 op=UNLOAD Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.281000 audit: BPF prog-id=167 op=LOAD Jul 2 07:57:57.281000 audit[3796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002916c8 items=0 ppid=3786 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:57.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936343466643531643066666533643331316233333666663162646537 Jul 2 07:57:57.349922 env[1237]: time="2024-07-02T07:57:57.349861457Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-cxbn9,Uid:6e423b60-704e-420e-9590-f0e5b18595c2,Namespace:kube-system,Attempt:1,} returns sandbox id \"9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61\"" Jul 2 07:57:57.354267 env[1237]: time="2024-07-02T07:57:57.354211338Z" level=info msg="CreateContainer within sandbox \"9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 07:57:57.384646 systemd-networkd[1034]: cali69fc1473e4f: Gained IPv6LL Jul 2 07:57:57.392398 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3598839601.mount: Deactivated successfully. Jul 2 07:57:57.405287 env[1237]: time="2024-07-02T07:57:57.400043263Z" level=info msg="CreateContainer within sandbox \"9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9554861d5d1f3a5edff82519065d1ff1ca7e05e9b029ab42eea529176c1feb2d\"" Jul 2 07:57:57.408189 env[1237]: time="2024-07-02T07:57:57.408149527Z" level=info msg="StartContainer for \"9554861d5d1f3a5edff82519065d1ff1ca7e05e9b029ab42eea529176c1feb2d\"" Jul 2 07:57:57.456755 systemd[1]: Started cri-containerd-9554861d5d1f3a5edff82519065d1ff1ca7e05e9b029ab42eea529176c1feb2d.scope. Jul 2 07:57:57.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.495000 audit: BPF prog-id=168 op=LOAD Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3786 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:57.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935353438363164356431663361356564666638323531393036356431 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3786 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:57.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935353438363164356431663361356564666638323531393036356431 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit: BPF prog-id=169 op=LOAD Jul 2 07:57:57.496000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00028ae60 items=0 ppid=3786 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:57.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935353438363164356431663361356564666638323531393036356431 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit: BPF prog-id=170 op=LOAD Jul 2 07:57:57.496000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00028aea8 items=0 ppid=3786 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:57.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935353438363164356431663361356564666638323531393036356431 Jul 2 07:57:57.496000 audit: BPF prog-id=170 op=UNLOAD Jul 2 07:57:57.496000 audit: BPF prog-id=169 op=UNLOAD Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { perfmon } for pid=3836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit[3836]: AVC avc: denied { bpf } for pid=3836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:57.496000 audit: BPF prog-id=171 op=LOAD Jul 2 07:57:57.496000 audit[3836]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00028b2b8 items=0 ppid=3786 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:57.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935353438363164356431663361356564666638323531393036356431 Jul 2 07:57:57.535934 env[1237]: time="2024-07-02T07:57:57.535847838Z" level=info msg="StartContainer for \"9554861d5d1f3a5edff82519065d1ff1ca7e05e9b029ab42eea529176c1feb2d\" returns successfully" Jul 2 07:57:57.615781 kubelet[2162]: I0702 07:57:57.613841 2162 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:57:57.689000 audit[3865]: NETFILTER_CFG table=filter:99 family=2 entries=9 op=nft_register_rule pid=3865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:57.689000 audit[3865]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd73f77eb0 a2=0 a3=7ffd73f77e9c items=0 ppid=2344 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:57.689000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:57.691000 audit[3865]: NETFILTER_CFG table=nat:100 family=2 entries=25 op=nft_register_chain pid=3865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:57.691000 audit[3865]: SYSCALL arch=c000003e syscall=46 success=yes exit=8580 a0=3 a1=7ffd73f77eb0 a2=0 a3=7ffd73f77e9c items=0 ppid=2344 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:57.691000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:58.172090 kubelet[2162]: I0702 07:57:58.172000 2162 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-cxbn9" podStartSLOduration=34.17196291 podStartE2EDuration="34.17196291s" podCreationTimestamp="2024-07-02 07:57:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 07:57:58.164942375 +0000 UTC m=+48.550629796" watchObservedRunningTime="2024-07-02 07:57:58.17196291 +0000 UTC m=+48.557650332" Jul 2 07:57:58.281000 audit[3907]: NETFILTER_CFG table=filter:101 family=2 entries=8 op=nft_register_rule pid=3907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:58.282564 systemd-networkd[1034]: vxlan.calico: Link UP Jul 2 07:57:58.282578 systemd-networkd[1034]: vxlan.calico: Gained carrier Jul 2 07:57:58.281000 audit[3907]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd8f114ce0 a2=0 a3=7ffd8f114ccc items=0 ppid=2344 pid=3907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:58.281000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:58.311000 audit[3907]: NETFILTER_CFG table=nat:102 family=2 entries=56 op=nft_register_chain pid=3907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:58.311000 audit[3907]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd8f114ce0 a2=0 a3=7ffd8f114ccc items=0 ppid=2344 pid=3907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:58.311000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:58.820000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.820000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.820000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.820000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.820000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.820000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.820000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.820000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.820000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.820000 audit: BPF prog-id=172 op=LOAD Jul 2 07:57:58.820000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd4770fb60 a2=70 a3=7f1566cba000 items=0 ppid=3866 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:58.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:58.822000 audit: BPF prog-id=172 op=UNLOAD Jul 2 07:57:58.822000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.822000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.822000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.822000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.822000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.822000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.822000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.822000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.822000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.822000 audit: BPF prog-id=173 op=LOAD Jul 2 07:57:58.822000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd4770fb60 a2=70 a3=6f items=0 ppid=3866 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:58.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:58.823000 audit: BPF prog-id=173 op=UNLOAD Jul 2 07:57:58.823000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.823000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd4770fb10 a2=70 a3=7ffd4770fb60 items=0 ppid=3866 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:58.823000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:58.823000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.823000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.823000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.823000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.823000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.823000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.823000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.823000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.823000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.823000 audit: BPF prog-id=174 op=LOAD Jul 2 07:57:58.823000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd4770faf0 a2=70 a3=7ffd4770fb60 items=0 ppid=3866 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:58.823000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:58.824000 audit: BPF prog-id=174 op=UNLOAD Jul 2 07:57:58.824000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.824000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4770fbd0 a2=70 a3=0 items=0 ppid=3866 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:58.824000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:58.825000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.825000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4770fbc0 a2=70 a3=0 items=0 ppid=3866 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:58.825000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:58.826000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.826000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4770fb30 a2=70 a3=0 items=0 ppid=3866 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:58.826000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:58.828000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.828000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd4770fc00 a2=70 a3=1fb58b0 items=0 ppid=3866 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:58.828000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:58.831000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.831000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd4770fc00 a2=70 a3=1fb2880 items=0 ppid=3866 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:58.831000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:58.831000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.831000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.831000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.831000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.831000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.831000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.831000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.831000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.831000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.831000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.831000 audit: BPF prog-id=175 op=LOAD Jul 2 07:57:58.831000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd4770fb20 a2=70 a3=0 items=0 ppid=3866 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:58.831000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:57:58.850000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.850000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff84c90aa0 a2=70 a3=fff80800 items=0 ppid=3866 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:58.850000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:57:58.850000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:58.850000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff84c90970 a2=70 a3=3 items=0 ppid=3866 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:58.850000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:57:58.857000 audit: BPF prog-id=175 op=UNLOAD Jul 2 07:57:58.983752 systemd-networkd[1034]: calic5499d70949: Gained IPv6LL Jul 2 07:57:59.107000 audit[3984]: NETFILTER_CFG table=mangle:103 family=2 entries=16 op=nft_register_chain pid=3984 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:59.107000 audit[3984]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc37d778d0 a2=0 a3=7ffc37d778bc items=0 ppid=3866 pid=3984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:59.107000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:57:59.118000 audit[3982]: NETFILTER_CFG table=nat:104 family=2 entries=15 op=nft_register_chain pid=3982 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:59.118000 audit[3982]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffe046aa80 a2=0 a3=7fffe046aa6c items=0 ppid=3866 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:59.118000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:57:59.190498 kernel: kauditd_printk_skb: 368 callbacks suppressed Jul 2 07:57:59.190672 kernel: audit: type=1325 audit(1719907079.180:1112): table=raw:105 family=2 entries=19 op=nft_register_chain pid=3985 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:59.180000 audit[3985]: NETFILTER_CFG table=raw:105 family=2 entries=19 op=nft_register_chain pid=3985 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:59.180000 audit[3985]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffe31c94b80 a2=0 a3=7ffe31c94b6c items=0 ppid=3866 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:59.262188 kernel: audit: type=1300 audit(1719907079.180:1112): arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffe31c94b80 a2=0 a3=7ffe31c94b6c items=0 ppid=3866 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:59.262334 kernel: audit: type=1327 audit(1719907079.180:1112): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:57:59.180000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:57:59.207000 audit[3987]: NETFILTER_CFG table=filter:106 family=2 entries=153 op=nft_register_chain pid=3987 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:59.314588 kernel: audit: type=1325 audit(1719907079.207:1113): table=filter:106 family=2 entries=153 op=nft_register_chain pid=3987 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:59.314755 kernel: audit: type=1300 audit(1719907079.207:1113): arch=c000003e syscall=46 success=yes exit=86564 a0=3 a1=7ffd06baa730 a2=0 a3=7ffd06baa71c items=0 ppid=3866 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:59.207000 audit[3987]: SYSCALL arch=c000003e syscall=46 success=yes exit=86564 a0=3 a1=7ffd06baa730 a2=0 a3=7ffd06baa71c items=0 ppid=3866 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:59.207000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:57:59.334957 kernel: audit: type=1327 audit(1719907079.207:1113): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:57:59.334000 audit[3992]: NETFILTER_CFG table=filter:107 family=2 entries=8 op=nft_register_rule pid=3992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:59.334000 audit[3992]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd373ae7a0 a2=0 a3=7ffd373ae78c items=0 ppid=2344 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:59.388000 kernel: audit: type=1325 audit(1719907079.334:1114): table=filter:107 family=2 entries=8 op=nft_register_rule pid=3992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:59.388187 kernel: audit: type=1300 audit(1719907079.334:1114): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd373ae7a0 a2=0 a3=7ffd373ae78c items=0 ppid=2344 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:59.334000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:59.401957 env[1237]: time="2024-07-02T07:57:59.401903476Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:59.406630 env[1237]: time="2024-07-02T07:57:59.406587087Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:59.407452 kernel: audit: type=1327 audit(1719907079.334:1114): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:59.390000 audit[3992]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=3992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:59.410931 env[1237]: time="2024-07-02T07:57:59.410893463Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:59.414149 env[1237]: time="2024-07-02T07:57:59.414114718Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c35e88abef622483409fff52313bf764a75095197be4c5a7c7830da342654de1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:59.415369 env[1237]: time="2024-07-02T07:57:59.415304163Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\" returns image reference \"sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783\"" Jul 2 07:57:59.425460 kernel: audit: type=1325 audit(1719907079.390:1115): table=nat:108 family=2 entries=20 op=nft_register_rule pid=3992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:57:59.390000 audit[3992]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd373ae7a0 a2=0 a3=7ffd373ae78c items=0 ppid=2344 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:59.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:57:59.442311 env[1237]: time="2024-07-02T07:57:59.434192491Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 07:57:59.454574 env[1237]: time="2024-07-02T07:57:59.454512699Z" level=info msg="CreateContainer within sandbox \"c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 2 07:57:59.479662 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1189758719.mount: Deactivated successfully. Jul 2 07:57:59.485084 env[1237]: time="2024-07-02T07:57:59.485012003Z" level=info msg="CreateContainer within sandbox \"c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"0cd1e2824c6d6c8369cae7d3c992222bdf18c72481d7cad937dbb58f7c66c5c1\"" Jul 2 07:57:59.487681 env[1237]: time="2024-07-02T07:57:59.487548543Z" level=info msg="StartContainer for \"0cd1e2824c6d6c8369cae7d3c992222bdf18c72481d7cad937dbb58f7c66c5c1\"" Jul 2 07:57:59.515212 systemd[1]: Started cri-containerd-0cd1e2824c6d6c8369cae7d3c992222bdf18c72481d7cad937dbb58f7c66c5c1.scope. Jul 2 07:57:59.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.543000 audit: BPF prog-id=176 op=LOAD Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3638 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:59.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063643165323832346336643663383336396361653764336339393232 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3638 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:59.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063643165323832346336643663383336396361653764336339393232 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit: BPF prog-id=177 op=LOAD Jul 2 07:57:59.544000 audit[4005]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000255cf0 items=0 ppid=3638 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:59.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063643165323832346336643663383336396361653764336339393232 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit: BPF prog-id=178 op=LOAD Jul 2 07:57:59.544000 audit[4005]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000255d38 items=0 ppid=3638 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:59.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063643165323832346336643663383336396361653764336339393232 Jul 2 07:57:59.544000 audit: BPF prog-id=178 op=UNLOAD Jul 2 07:57:59.544000 audit: BPF prog-id=177 op=UNLOAD Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:57:59.544000 audit: BPF prog-id=179 op=LOAD Jul 2 07:57:59.544000 audit[4005]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000342148 items=0 ppid=3638 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:59.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063643165323832346336643663383336396361653764336339393232 Jul 2 07:57:59.591001 env[1237]: time="2024-07-02T07:57:59.590831641Z" level=info msg="StartContainer for \"0cd1e2824c6d6c8369cae7d3c992222bdf18c72481d7cad937dbb58f7c66c5c1\" returns successfully" Jul 2 07:57:59.944207 systemd-networkd[1034]: vxlan.calico: Gained IPv6LL Jul 2 07:58:00.179008 kubelet[2162]: I0702 07:58:00.178942 2162 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7bf6c8cb-74b2c" podStartSLOduration=26.296921258 podStartE2EDuration="29.178917656s" podCreationTimestamp="2024-07-02 07:57:31 +0000 UTC" firstStartedPulling="2024-07-02 07:57:56.538153746 +0000 UTC m=+46.923841160" lastFinishedPulling="2024-07-02 07:57:59.420150147 +0000 UTC m=+49.805837558" observedRunningTime="2024-07-02 07:58:00.172655347 +0000 UTC m=+50.558342768" watchObservedRunningTime="2024-07-02 07:58:00.178917656 +0000 UTC m=+50.564605077" Jul 2 07:58:00.611250 env[1237]: time="2024-07-02T07:58:00.611185117Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:00.614321 env[1237]: time="2024-07-02T07:58:00.614265330Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:00.616984 env[1237]: time="2024-07-02T07:58:00.616946421Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:00.619611 env[1237]: time="2024-07-02T07:58:00.619573878Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:00.620284 env[1237]: time="2024-07-02T07:58:00.620234268Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020\"" Jul 2 07:58:00.626009 env[1237]: time="2024-07-02T07:58:00.625952644Z" level=info msg="CreateContainer within sandbox \"65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 07:58:00.651421 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1588425944.mount: Deactivated successfully. Jul 2 07:58:00.656652 env[1237]: time="2024-07-02T07:58:00.656591902Z" level=info msg="CreateContainer within sandbox \"65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"64db28eb93bff6b29f8bc72a007a0d977c4ec0ab47cdc366191904ff6240ddc0\"" Jul 2 07:58:00.659107 env[1237]: time="2024-07-02T07:58:00.657567856Z" level=info msg="StartContainer for \"64db28eb93bff6b29f8bc72a007a0d977c4ec0ab47cdc366191904ff6240ddc0\"" Jul 2 07:58:00.701636 systemd[1]: Started cri-containerd-64db28eb93bff6b29f8bc72a007a0d977c4ec0ab47cdc366191904ff6240ddc0.scope. Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fa2f0164588 items=0 ppid=3520 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:00.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634646232386562393362666636623239663862633732613030376130 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit: BPF prog-id=180 op=LOAD Jul 2 07:58:00.722000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0001f7218 items=0 ppid=3520 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:00.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634646232386562393362666636623239663862633732613030376130 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.722000 audit: BPF prog-id=181 op=LOAD Jul 2 07:58:00.722000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0001f7268 items=0 ppid=3520 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:00.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634646232386562393362666636623239663862633732613030376130 Jul 2 07:58:00.722000 audit: BPF prog-id=181 op=UNLOAD Jul 2 07:58:00.723000 audit: BPF prog-id=180 op=UNLOAD Jul 2 07:58:00.723000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.723000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.723000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.723000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.723000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.723000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.723000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.723000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.723000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.723000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:00.723000 audit: BPF prog-id=182 op=LOAD Jul 2 07:58:00.723000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0001f72f8 items=0 ppid=3520 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:00.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634646232386562393362666636623239663862633732613030376130 Jul 2 07:58:00.750855 env[1237]: time="2024-07-02T07:58:00.750796700Z" level=info msg="StartContainer for \"64db28eb93bff6b29f8bc72a007a0d977c4ec0ab47cdc366191904ff6240ddc0\" returns successfully" Jul 2 07:58:00.977603 kubelet[2162]: I0702 07:58:00.977459 2162 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 07:58:00.977603 kubelet[2162]: I0702 07:58:00.977504 2162 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 07:58:01.173018 kubelet[2162]: I0702 07:58:01.172915 2162 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-wwmcp" podStartSLOduration=24.891520965 podStartE2EDuration="30.172890138s" podCreationTimestamp="2024-07-02 07:57:31 +0000 UTC" firstStartedPulling="2024-07-02 07:57:55.340557172 +0000 UTC m=+45.726244570" lastFinishedPulling="2024-07-02 07:58:00.621926328 +0000 UTC m=+51.007613743" observedRunningTime="2024-07-02 07:58:01.171036434 +0000 UTC m=+51.556723856" watchObservedRunningTime="2024-07-02 07:58:01.172890138 +0000 UTC m=+51.558577559" Jul 2 07:58:04.303750 systemd[1]: run-containerd-runc-k8s.io-584e6bac2109c77cd7db2e85785a9310738dc00b990d500fa153bbfb153eda68-runc.yEr8Ee.mount: Deactivated successfully. Jul 2 07:58:05.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.73:22-147.75.109.163:42926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:05.529770 systemd[1]: Started sshd@9-10.128.0.73:22-147.75.109.163:42926.service. Jul 2 07:58:05.550205 kernel: kauditd_printk_skb: 102 callbacks suppressed Jul 2 07:58:05.550326 kernel: audit: type=1130 audit(1719907085.529:1140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.73:22-147.75.109.163:42926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:05.632282 kubelet[2162]: I0702 07:58:05.632231 2162 topology_manager.go:215] "Topology Admit Handler" podUID="5f3182e2-5417-4da5-b9a5-4dc22daf862b" podNamespace="calico-apiserver" podName="calico-apiserver-789cd85475-49th9" Jul 2 07:58:05.640391 systemd[1]: Created slice kubepods-besteffort-pod5f3182e2_5417_4da5_b9a5_4dc22daf862b.slice. Jul 2 07:58:05.651504 kubelet[2162]: W0702 07:58:05.648110 2162 reflector.go:547] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal' and this object Jul 2 07:58:05.651504 kubelet[2162]: E0702 07:58:05.648155 2162 reflector.go:150] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal' and this object Jul 2 07:58:05.651504 kubelet[2162]: W0702 07:58:05.648412 2162 reflector.go:547] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal' and this object Jul 2 07:58:05.651504 kubelet[2162]: E0702 07:58:05.648466 2162 reflector.go:150] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal' and this object Jul 2 07:58:05.670705 kubelet[2162]: I0702 07:58:05.670654 2162 topology_manager.go:215] "Topology Admit Handler" podUID="ee48e1c5-ce80-4ce6-846e-207983d5f956" podNamespace="calico-apiserver" podName="calico-apiserver-789cd85475-5b78z" Jul 2 07:58:05.680398 systemd[1]: Created slice kubepods-besteffort-podee48e1c5_ce80_4ce6_846e_207983d5f956.slice. Jul 2 07:58:05.688406 kubelet[2162]: I0702 07:58:05.688368 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mg22l\" (UniqueName: \"kubernetes.io/projected/5f3182e2-5417-4da5-b9a5-4dc22daf862b-kube-api-access-mg22l\") pod \"calico-apiserver-789cd85475-49th9\" (UID: \"5f3182e2-5417-4da5-b9a5-4dc22daf862b\") " pod="calico-apiserver/calico-apiserver-789cd85475-49th9" Jul 2 07:58:05.688733 kubelet[2162]: I0702 07:58:05.688694 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5f3182e2-5417-4da5-b9a5-4dc22daf862b-calico-apiserver-certs\") pod \"calico-apiserver-789cd85475-49th9\" (UID: \"5f3182e2-5417-4da5-b9a5-4dc22daf862b\") " pod="calico-apiserver/calico-apiserver-789cd85475-49th9" Jul 2 07:58:05.735000 audit[4129]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:05.752474 kernel: audit: type=1325 audit(1719907085.735:1141): table=filter:109 family=2 entries=8 op=nft_register_rule pid=4129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:05.786857 kernel: audit: type=1300 audit(1719907085.735:1141): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeb661c5e0 a2=0 a3=7ffeb661c5cc items=0 ppid=2344 pid=4129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.735000 audit[4129]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeb661c5e0 a2=0 a3=7ffeb661c5cc items=0 ppid=2344 pid=4129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.804657 kernel: audit: type=1327 audit(1719907085.735:1141): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:05.735000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:05.804844 kubelet[2162]: I0702 07:58:05.789898 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ee48e1c5-ce80-4ce6-846e-207983d5f956-calico-apiserver-certs\") pod \"calico-apiserver-789cd85475-5b78z\" (UID: \"ee48e1c5-ce80-4ce6-846e-207983d5f956\") " pod="calico-apiserver/calico-apiserver-789cd85475-5b78z" Jul 2 07:58:05.804844 kubelet[2162]: I0702 07:58:05.789969 2162 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7zhtn\" (UniqueName: \"kubernetes.io/projected/ee48e1c5-ce80-4ce6-846e-207983d5f956-kube-api-access-7zhtn\") pod \"calico-apiserver-789cd85475-5b78z\" (UID: \"ee48e1c5-ce80-4ce6-846e-207983d5f956\") " pod="calico-apiserver/calico-apiserver-789cd85475-5b78z" Jul 2 07:58:05.743000 audit[4129]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=4129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:05.855596 kernel: audit: type=1325 audit(1719907085.743:1142): table=nat:110 family=2 entries=20 op=nft_register_rule pid=4129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:05.855764 kernel: audit: type=1300 audit(1719907085.743:1142): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffeb661c5e0 a2=0 a3=7ffeb661c5cc items=0 ppid=2344 pid=4129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.743000 audit[4129]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffeb661c5e0 a2=0 a3=7ffeb661c5cc items=0 ppid=2344 pid=4129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.871939 kernel: audit: type=1327 audit(1719907085.743:1142): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:05.743000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:05.853000 audit[4131]: NETFILTER_CFG table=filter:111 family=2 entries=9 op=nft_register_rule pid=4131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:05.888608 kernel: audit: type=1325 audit(1719907085.853:1143): table=filter:111 family=2 entries=9 op=nft_register_rule pid=4131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:05.888737 kernel: audit: type=1300 audit(1719907085.853:1143): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff19558080 a2=0 a3=7fff1955806c items=0 ppid=2344 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.853000 audit[4131]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff19558080 a2=0 a3=7fff1955806c items=0 ppid=2344 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.894989 sshd[4126]: Accepted publickey for core from 147.75.109.163 port 42926 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:05.923071 sshd[4126]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:05.853000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:05.943703 kernel: audit: type=1327 audit(1719907085.853:1143): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:05.870000 audit[4131]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:05.870000 audit[4131]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff19558080 a2=0 a3=7fff1955806c items=0 ppid=2344 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.870000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:05.893000 audit[4126]: USER_ACCT pid=4126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:05.921000 audit[4126]: CRED_ACQ pid=4126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:05.921000 audit[4126]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6e87f5a0 a2=3 a3=0 items=0 ppid=1 pid=4126 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:05.921000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:05.947766 systemd-logind[1222]: New session 10 of user core. Jul 2 07:58:05.949191 systemd[1]: Started session-10.scope. Jul 2 07:58:05.958000 audit[4126]: USER_START pid=4126 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:05.961000 audit[4132]: CRED_ACQ pid=4132 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:06.192000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:06.192000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c009fcdcb0 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:58:06.192000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:58:06.198000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:06.198000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:06.198000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00941b3e0 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:58:06.198000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:58:06.198000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c009fcdd40 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:58:06.198000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:58:06.226000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:06.226000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00c100db0 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:58:06.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:58:06.234000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:06.234000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00be9c570 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:58:06.234000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:58:06.235000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:06.235000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00941bd80 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:58:06.235000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:58:06.240000 audit[4126]: USER_END pid=4126 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:06.239696 sshd[4126]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:06.241000 audit[4126]: CRED_DISP pid=4126 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:06.245195 systemd[1]: sshd@9-10.128.0.73:22-147.75.109.163:42926.service: Deactivated successfully. Jul 2 07:58:06.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.73:22-147.75.109.163:42926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:06.246552 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 07:58:06.248235 systemd-logind[1222]: Session 10 logged out. Waiting for processes to exit. Jul 2 07:58:06.250173 systemd-logind[1222]: Removed session 10. Jul 2 07:58:06.828108 kubelet[2162]: E0702 07:58:06.828049 2162 projected.go:294] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Jul 2 07:58:06.828108 kubelet[2162]: E0702 07:58:06.828100 2162 projected.go:200] Error preparing data for projected volume kube-api-access-mg22l for pod calico-apiserver/calico-apiserver-789cd85475-49th9: failed to sync configmap cache: timed out waiting for the condition Jul 2 07:58:06.828783 kubelet[2162]: E0702 07:58:06.828205 2162 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/5f3182e2-5417-4da5-b9a5-4dc22daf862b-kube-api-access-mg22l podName:5f3182e2-5417-4da5-b9a5-4dc22daf862b nodeName:}" failed. No retries permitted until 2024-07-02 07:58:07.328173551 +0000 UTC m=+57.713860944 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-mg22l" (UniqueName: "kubernetes.io/projected/5f3182e2-5417-4da5-b9a5-4dc22daf862b-kube-api-access-mg22l") pod "calico-apiserver-789cd85475-49th9" (UID: "5f3182e2-5417-4da5-b9a5-4dc22daf862b") : failed to sync configmap cache: timed out waiting for the condition Jul 2 07:58:06.943379 kubelet[2162]: E0702 07:58:06.943323 2162 projected.go:294] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Jul 2 07:58:06.943379 kubelet[2162]: E0702 07:58:06.943386 2162 projected.go:200] Error preparing data for projected volume kube-api-access-7zhtn for pod calico-apiserver/calico-apiserver-789cd85475-5b78z: failed to sync configmap cache: timed out waiting for the condition Jul 2 07:58:06.943828 kubelet[2162]: E0702 07:58:06.943531 2162 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/ee48e1c5-ce80-4ce6-846e-207983d5f956-kube-api-access-7zhtn podName:ee48e1c5-ce80-4ce6-846e-207983d5f956 nodeName:}" failed. No retries permitted until 2024-07-02 07:58:07.443499771 +0000 UTC m=+57.829187184 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-7zhtn" (UniqueName: "kubernetes.io/projected/ee48e1c5-ce80-4ce6-846e-207983d5f956-kube-api-access-7zhtn") pod "calico-apiserver-789cd85475-5b78z" (UID: "ee48e1c5-ce80-4ce6-846e-207983d5f956") : failed to sync configmap cache: timed out waiting for the condition Jul 2 07:58:07.357000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:07.357000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cbf470 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:58:07.357000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:07.358000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:07.358000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f2dc00 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:58:07.358000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:07.447583 env[1237]: time="2024-07-02T07:58:07.447507947Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-789cd85475-49th9,Uid:5f3182e2-5417-4da5-b9a5-4dc22daf862b,Namespace:calico-apiserver,Attempt:0,}" Jul 2 07:58:07.666885 systemd-networkd[1034]: calibb0aa16a99e: Link UP Jul 2 07:58:07.675499 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:58:07.685204 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibb0aa16a99e: link becomes ready Jul 2 07:58:07.692808 systemd-networkd[1034]: calibb0aa16a99e: Gained carrier Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.557 [INFO][4146] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--49th9-eth0 calico-apiserver-789cd85475- calico-apiserver 5f3182e2-5417-4da5-b9a5-4dc22daf862b 842 0 2024-07-02 07:58:05 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:789cd85475 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal calico-apiserver-789cd85475-49th9 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calibb0aa16a99e [] []}} ContainerID="eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" Namespace="calico-apiserver" Pod="calico-apiserver-789cd85475-49th9" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--49th9-" Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.558 [INFO][4146] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" Namespace="calico-apiserver" Pod="calico-apiserver-789cd85475-49th9" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--49th9-eth0" Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.605 [INFO][4157] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" HandleID="k8s-pod-network.eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--49th9-eth0" Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.618 [INFO][4157] ipam_plugin.go 264: Auto assigning IP ContainerID="eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" HandleID="k8s-pod-network.eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--49th9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002efb90), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", "pod":"calico-apiserver-789cd85475-49th9", "timestamp":"2024-07-02 07:58:07.605653057 +0000 UTC"}, Hostname:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.618 [INFO][4157] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.619 [INFO][4157] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.619 [INFO][4157] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal' Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.621 [INFO][4157] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.625 [INFO][4157] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.632 [INFO][4157] ipam.go 489: Trying affinity for 192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.635 [INFO][4157] ipam.go 155: Attempting to load block cidr=192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.638 [INFO][4157] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.638 [INFO][4157] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.192/26 handle="k8s-pod-network.eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.640 [INFO][4157] ipam.go 1685: Creating new handle: k8s-pod-network.eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7 Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.645 [INFO][4157] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.192/26 handle="k8s-pod-network.eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.652 [INFO][4157] ipam.go 1216: Successfully claimed IPs: [192.168.123.197/26] block=192.168.123.192/26 handle="k8s-pod-network.eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.652 [INFO][4157] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.197/26] handle="k8s-pod-network.eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.652 [INFO][4157] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:07.706799 env[1237]: 2024-07-02 07:58:07.652 [INFO][4157] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.123.197/26] IPv6=[] ContainerID="eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" HandleID="k8s-pod-network.eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--49th9-eth0" Jul 2 07:58:07.708175 env[1237]: 2024-07-02 07:58:07.654 [INFO][4146] k8s.go 386: Populated endpoint ContainerID="eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" Namespace="calico-apiserver" Pod="calico-apiserver-789cd85475-49th9" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--49th9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--49th9-eth0", GenerateName:"calico-apiserver-789cd85475-", Namespace:"calico-apiserver", SelfLink:"", UID:"5f3182e2-5417-4da5-b9a5-4dc22daf862b", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"789cd85475", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-789cd85475-49th9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.123.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibb0aa16a99e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:07.708175 env[1237]: 2024-07-02 07:58:07.655 [INFO][4146] k8s.go 387: Calico CNI using IPs: [192.168.123.197/32] ContainerID="eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" Namespace="calico-apiserver" Pod="calico-apiserver-789cd85475-49th9" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--49th9-eth0" Jul 2 07:58:07.708175 env[1237]: 2024-07-02 07:58:07.655 [INFO][4146] dataplane_linux.go 68: Setting the host side veth name to calibb0aa16a99e ContainerID="eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" Namespace="calico-apiserver" Pod="calico-apiserver-789cd85475-49th9" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--49th9-eth0" Jul 2 07:58:07.708175 env[1237]: 2024-07-02 07:58:07.667 [INFO][4146] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" Namespace="calico-apiserver" Pod="calico-apiserver-789cd85475-49th9" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--49th9-eth0" Jul 2 07:58:07.708175 env[1237]: 2024-07-02 07:58:07.667 [INFO][4146] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" Namespace="calico-apiserver" Pod="calico-apiserver-789cd85475-49th9" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--49th9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--49th9-eth0", GenerateName:"calico-apiserver-789cd85475-", Namespace:"calico-apiserver", SelfLink:"", UID:"5f3182e2-5417-4da5-b9a5-4dc22daf862b", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"789cd85475", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7", Pod:"calico-apiserver-789cd85475-49th9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.123.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibb0aa16a99e", MAC:"da:e6:a1:5e:7c:3b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:07.708175 env[1237]: 2024-07-02 07:58:07.705 [INFO][4146] k8s.go 500: Wrote updated endpoint to datastore ContainerID="eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7" Namespace="calico-apiserver" Pod="calico-apiserver-789cd85475-49th9" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--49th9-eth0" Jul 2 07:58:07.755216 env[1237]: time="2024-07-02T07:58:07.752341286Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:58:07.755216 env[1237]: time="2024-07-02T07:58:07.752409064Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:58:07.755216 env[1237]: time="2024-07-02T07:58:07.752471230Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:58:07.755216 env[1237]: time="2024-07-02T07:58:07.752701080Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7 pid=4185 runtime=io.containerd.runc.v2 Jul 2 07:58:07.753000 audit[4190]: NETFILTER_CFG table=filter:113 family=2 entries=51 op=nft_register_chain pid=4190 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:07.753000 audit[4190]: SYSCALL arch=c000003e syscall=46 success=yes exit=26260 a0=3 a1=7fff02fd54e0 a2=0 a3=7fff02fd54cc items=0 ppid=3866 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:07.753000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:07.785700 env[1237]: time="2024-07-02T07:58:07.785621942Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-789cd85475-5b78z,Uid:ee48e1c5-ce80-4ce6-846e-207983d5f956,Namespace:calico-apiserver,Attempt:0,}" Jul 2 07:58:07.855633 systemd[1]: Started cri-containerd-eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7.scope. Jul 2 07:58:07.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.912000 audit: BPF prog-id=183 op=LOAD Jul 2 07:58:07.914000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.914000 audit[4197]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4185 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:07.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565646634313463366566333463343633396663303463383130376136 Jul 2 07:58:07.914000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.914000 audit[4197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4185 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:07.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565646634313463366566333463343633396663303463383130376136 Jul 2 07:58:07.914000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.914000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.914000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.914000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.914000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.914000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.914000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.914000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.914000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.914000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.914000 audit: BPF prog-id=184 op=LOAD Jul 2 07:58:07.914000 audit[4197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00017ff00 items=0 ppid=4185 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:07.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565646634313463366566333463343633396663303463383130376136 Jul 2 07:58:07.916000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.916000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.916000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.916000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.916000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.916000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.916000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.916000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.916000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.916000 audit: BPF prog-id=185 op=LOAD Jul 2 07:58:07.916000 audit[4197]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00017ff48 items=0 ppid=4185 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:07.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565646634313463366566333463343633396663303463383130376136 Jul 2 07:58:07.916000 audit: BPF prog-id=185 op=UNLOAD Jul 2 07:58:07.917000 audit: BPF prog-id=184 op=UNLOAD Jul 2 07:58:07.917000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.917000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.917000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.917000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.917000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.917000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.917000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.917000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.917000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.917000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:07.917000 audit: BPF prog-id=186 op=LOAD Jul 2 07:58:07.917000 audit[4197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f4358 items=0 ppid=4185 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:07.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565646634313463366566333463343633396663303463383130376136 Jul 2 07:58:08.029670 env[1237]: time="2024-07-02T07:58:08.029594423Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-789cd85475-49th9,Uid:5f3182e2-5417-4da5-b9a5-4dc22daf862b,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7\"" Jul 2 07:58:08.041461 env[1237]: time="2024-07-02T07:58:08.041376679Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 07:58:08.235120 systemd-networkd[1034]: calib673de1b367: Link UP Jul 2 07:58:08.259369 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib673de1b367: link becomes ready Jul 2 07:58:08.260201 systemd-networkd[1034]: calib673de1b367: Gained carrier Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:07.968 [INFO][4210] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--5b78z-eth0 calico-apiserver-789cd85475- calico-apiserver ee48e1c5-ce80-4ce6-846e-207983d5f956 853 0 2024-07-02 07:58:05 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:789cd85475 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal calico-apiserver-789cd85475-5b78z eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calib673de1b367 [] []}} ContainerID="6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" Namespace="calico-apiserver" Pod="calico-apiserver-789cd85475-5b78z" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--5b78z-" Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:07.968 [INFO][4210] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" Namespace="calico-apiserver" Pod="calico-apiserver-789cd85475-5b78z" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--5b78z-eth0" Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:08.137 [INFO][4231] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" HandleID="k8s-pod-network.6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--5b78z-eth0" Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:08.163 [INFO][4231] ipam_plugin.go 264: Auto assigning IP ContainerID="6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" HandleID="k8s-pod-network.6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--5b78z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002efe10), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", "pod":"calico-apiserver-789cd85475-5b78z", "timestamp":"2024-07-02 07:58:08.137561192 +0000 UTC"}, Hostname:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:08.163 [INFO][4231] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:08.163 [INFO][4231] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:08.163 [INFO][4231] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal' Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:08.165 [INFO][4231] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:08.176 [INFO][4231] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:08.187 [INFO][4231] ipam.go 489: Trying affinity for 192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:08.190 [INFO][4231] ipam.go 155: Attempting to load block cidr=192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:08.194 [INFO][4231] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.192/26 host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:08.194 [INFO][4231] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.192/26 handle="k8s-pod-network.6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:08.198 [INFO][4231] ipam.go 1685: Creating new handle: k8s-pod-network.6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349 Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:08.214 [INFO][4231] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.192/26 handle="k8s-pod-network.6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:08.225 [INFO][4231] ipam.go 1216: Successfully claimed IPs: [192.168.123.198/26] block=192.168.123.192/26 handle="k8s-pod-network.6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:08.225 [INFO][4231] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.198/26] handle="k8s-pod-network.6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" host="ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal" Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:08.225 [INFO][4231] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:08.283954 env[1237]: 2024-07-02 07:58:08.225 [INFO][4231] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.123.198/26] IPv6=[] ContainerID="6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" HandleID="k8s-pod-network.6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--5b78z-eth0" Jul 2 07:58:08.285203 env[1237]: 2024-07-02 07:58:08.227 [INFO][4210] k8s.go 386: Populated endpoint ContainerID="6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" Namespace="calico-apiserver" Pod="calico-apiserver-789cd85475-5b78z" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--5b78z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--5b78z-eth0", GenerateName:"calico-apiserver-789cd85475-", Namespace:"calico-apiserver", SelfLink:"", UID:"ee48e1c5-ce80-4ce6-846e-207983d5f956", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"789cd85475", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-789cd85475-5b78z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.123.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib673de1b367", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:08.285203 env[1237]: 2024-07-02 07:58:08.228 [INFO][4210] k8s.go 387: Calico CNI using IPs: [192.168.123.198/32] ContainerID="6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" Namespace="calico-apiserver" Pod="calico-apiserver-789cd85475-5b78z" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--5b78z-eth0" Jul 2 07:58:08.285203 env[1237]: 2024-07-02 07:58:08.228 [INFO][4210] dataplane_linux.go 68: Setting the host side veth name to calib673de1b367 ContainerID="6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" Namespace="calico-apiserver" Pod="calico-apiserver-789cd85475-5b78z" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--5b78z-eth0" Jul 2 07:58:08.285203 env[1237]: 2024-07-02 07:58:08.259 [INFO][4210] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" Namespace="calico-apiserver" Pod="calico-apiserver-789cd85475-5b78z" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--5b78z-eth0" Jul 2 07:58:08.285203 env[1237]: 2024-07-02 07:58:08.261 [INFO][4210] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" Namespace="calico-apiserver" Pod="calico-apiserver-789cd85475-5b78z" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--5b78z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--5b78z-eth0", GenerateName:"calico-apiserver-789cd85475-", Namespace:"calico-apiserver", SelfLink:"", UID:"ee48e1c5-ce80-4ce6-846e-207983d5f956", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 58, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"789cd85475", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349", Pod:"calico-apiserver-789cd85475-5b78z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.123.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib673de1b367", MAC:"86:5f:f9:78:62:26", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:08.285203 env[1237]: 2024-07-02 07:58:08.281 [INFO][4210] k8s.go 500: Wrote updated endpoint to datastore ContainerID="6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349" Namespace="calico-apiserver" Pod="calico-apiserver-789cd85475-5b78z" WorkloadEndpoint="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--apiserver--789cd85475--5b78z-eth0" Jul 2 07:58:08.324393 env[1237]: time="2024-07-02T07:58:08.324295018Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:58:08.324671 env[1237]: time="2024-07-02T07:58:08.324363538Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:58:08.324671 env[1237]: time="2024-07-02T07:58:08.324383134Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:58:08.324969 env[1237]: time="2024-07-02T07:58:08.324905183Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349 pid=4256 runtime=io.containerd.runc.v2 Jul 2 07:58:08.350077 systemd[1]: Started cri-containerd-6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349.scope. Jul 2 07:58:08.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.397000 audit: BPF prog-id=187 op=LOAD Jul 2 07:58:08.397000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.397000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4256 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:08.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665323437313461633662633562343038306634343831393865646236 Jul 2 07:58:08.397000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.397000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4256 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:08.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665323437313461633662633562343038306634343831393865646236 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit: BPF prog-id=188 op=LOAD Jul 2 07:58:08.398000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00018bfa0 items=0 ppid=4256 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:08.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665323437313461633662633562343038306634343831393865646236 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit: BPF prog-id=189 op=LOAD Jul 2 07:58:08.398000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00018bfe8 items=0 ppid=4256 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:08.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665323437313461633662633562343038306634343831393865646236 Jul 2 07:58:08.398000 audit: BPF prog-id=189 op=UNLOAD Jul 2 07:58:08.398000 audit: BPF prog-id=188 op=UNLOAD Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:08.398000 audit: BPF prog-id=190 op=LOAD Jul 2 07:58:08.398000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001aa3f8 items=0 ppid=4256 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:08.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665323437313461633662633562343038306634343831393865646236 Jul 2 07:58:08.431000 audit[4288]: NETFILTER_CFG table=filter:114 family=2 entries=51 op=nft_register_chain pid=4288 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:58:08.431000 audit[4288]: SYSCALL arch=c000003e syscall=46 success=yes exit=25948 a0=3 a1=7ffd8fda77b0 a2=0 a3=7ffd8fda779c items=0 ppid=3866 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:08.431000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:58:08.450801 env[1237]: time="2024-07-02T07:58:08.450752641Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-789cd85475-5b78z,Uid:ee48e1c5-ce80-4ce6-846e-207983d5f956,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349\"" Jul 2 07:58:08.523367 systemd[1]: run-containerd-runc-k8s.io-eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7-runc.itzQ4B.mount: Deactivated successfully. Jul 2 07:58:09.096750 systemd-networkd[1034]: calibb0aa16a99e: Gained IPv6LL Jul 2 07:58:09.847485 env[1237]: time="2024-07-02T07:58:09.847418139Z" level=info msg="StopPodSandbox for \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\"" Jul 2 07:58:09.927636 systemd-networkd[1034]: calib673de1b367: Gained IPv6LL Jul 2 07:58:10.092655 env[1237]: 2024-07-02 07:58:10.007 [WARNING][4315] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59", ResourceVersion:"693", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea", Pod:"coredns-7db6d8ff4d-xgqmj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5ed674ebf08", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:10.092655 env[1237]: 2024-07-02 07:58:10.007 [INFO][4315] k8s.go 608: Cleaning up netns ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Jul 2 07:58:10.092655 env[1237]: 2024-07-02 07:58:10.007 [INFO][4315] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" iface="eth0" netns="" Jul 2 07:58:10.092655 env[1237]: 2024-07-02 07:58:10.007 [INFO][4315] k8s.go 615: Releasing IP address(es) ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Jul 2 07:58:10.092655 env[1237]: 2024-07-02 07:58:10.007 [INFO][4315] utils.go 188: Calico CNI releasing IP address ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Jul 2 07:58:10.092655 env[1237]: 2024-07-02 07:58:10.077 [INFO][4324] ipam_plugin.go 411: Releasing address using handleID ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" HandleID="k8s-pod-network.09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" Jul 2 07:58:10.092655 env[1237]: 2024-07-02 07:58:10.077 [INFO][4324] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:10.092655 env[1237]: 2024-07-02 07:58:10.078 [INFO][4324] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:10.092655 env[1237]: 2024-07-02 07:58:10.087 [WARNING][4324] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" HandleID="k8s-pod-network.09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" Jul 2 07:58:10.092655 env[1237]: 2024-07-02 07:58:10.087 [INFO][4324] ipam_plugin.go 439: Releasing address using workloadID ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" HandleID="k8s-pod-network.09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" Jul 2 07:58:10.092655 env[1237]: 2024-07-02 07:58:10.089 [INFO][4324] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:10.092655 env[1237]: 2024-07-02 07:58:10.091 [INFO][4315] k8s.go 621: Teardown processing complete. ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Jul 2 07:58:10.093632 env[1237]: time="2024-07-02T07:58:10.092688111Z" level=info msg="TearDown network for sandbox \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\" successfully" Jul 2 07:58:10.093632 env[1237]: time="2024-07-02T07:58:10.092731102Z" level=info msg="StopPodSandbox for \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\" returns successfully" Jul 2 07:58:10.094593 env[1237]: time="2024-07-02T07:58:10.094519276Z" level=info msg="RemovePodSandbox for \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\"" Jul 2 07:58:10.094796 env[1237]: time="2024-07-02T07:58:10.094739997Z" level=info msg="Forcibly stopping sandbox \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\"" Jul 2 07:58:10.336423 env[1237]: 2024-07-02 07:58:10.254 [WARNING][4345] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"dfd55eb4-c0b4-44ac-8b12-6a7f2cb17c59", ResourceVersion:"693", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"d0d323a020ff978ee273bba13eda576c23141999069c7773a55842265eded6ea", Pod:"coredns-7db6d8ff4d-xgqmj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5ed674ebf08", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:10.336423 env[1237]: 2024-07-02 07:58:10.254 [INFO][4345] k8s.go 608: Cleaning up netns ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Jul 2 07:58:10.336423 env[1237]: 2024-07-02 07:58:10.254 [INFO][4345] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" iface="eth0" netns="" Jul 2 07:58:10.336423 env[1237]: 2024-07-02 07:58:10.254 [INFO][4345] k8s.go 615: Releasing IP address(es) ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Jul 2 07:58:10.336423 env[1237]: 2024-07-02 07:58:10.254 [INFO][4345] utils.go 188: Calico CNI releasing IP address ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Jul 2 07:58:10.336423 env[1237]: 2024-07-02 07:58:10.321 [INFO][4353] ipam_plugin.go 411: Releasing address using handleID ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" HandleID="k8s-pod-network.09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" Jul 2 07:58:10.336423 env[1237]: 2024-07-02 07:58:10.321 [INFO][4353] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:10.336423 env[1237]: 2024-07-02 07:58:10.321 [INFO][4353] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:10.336423 env[1237]: 2024-07-02 07:58:10.331 [WARNING][4353] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" HandleID="k8s-pod-network.09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" Jul 2 07:58:10.336423 env[1237]: 2024-07-02 07:58:10.331 [INFO][4353] ipam_plugin.go 439: Releasing address using workloadID ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" HandleID="k8s-pod-network.09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--xgqmj-eth0" Jul 2 07:58:10.336423 env[1237]: 2024-07-02 07:58:10.333 [INFO][4353] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:10.336423 env[1237]: 2024-07-02 07:58:10.334 [INFO][4345] k8s.go 621: Teardown processing complete. ContainerID="09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5" Jul 2 07:58:10.337465 env[1237]: time="2024-07-02T07:58:10.337354824Z" level=info msg="TearDown network for sandbox \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\" successfully" Jul 2 07:58:10.343148 env[1237]: time="2024-07-02T07:58:10.343102459Z" level=info msg="RemovePodSandbox \"09399491ca5277eff91cd31bcc0d433fa235afbb6f1d0dec4426205cffcee2e5\" returns successfully" Jul 2 07:58:10.344001 env[1237]: time="2024-07-02T07:58:10.343954761Z" level=info msg="StopPodSandbox for \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\"" Jul 2 07:58:10.539513 env[1237]: 2024-07-02 07:58:10.465 [WARNING][4373] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0", GenerateName:"calico-kube-controllers-7bf6c8cb-", Namespace:"calico-system", SelfLink:"", UID:"41b6dc6f-519b-4482-a5ad-eb2bf5a550b7", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bf6c8cb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e", Pod:"calico-kube-controllers-7bf6c8cb-74b2c", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.123.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali69fc1473e4f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:10.539513 env[1237]: 2024-07-02 07:58:10.466 [INFO][4373] k8s.go 608: Cleaning up netns ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Jul 2 07:58:10.539513 env[1237]: 2024-07-02 07:58:10.466 [INFO][4373] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" iface="eth0" netns="" Jul 2 07:58:10.539513 env[1237]: 2024-07-02 07:58:10.466 [INFO][4373] k8s.go 615: Releasing IP address(es) ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Jul 2 07:58:10.539513 env[1237]: 2024-07-02 07:58:10.466 [INFO][4373] utils.go 188: Calico CNI releasing IP address ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Jul 2 07:58:10.539513 env[1237]: 2024-07-02 07:58:10.525 [INFO][4380] ipam_plugin.go 411: Releasing address using handleID ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" HandleID="k8s-pod-network.b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" Jul 2 07:58:10.539513 env[1237]: 2024-07-02 07:58:10.525 [INFO][4380] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:10.539513 env[1237]: 2024-07-02 07:58:10.525 [INFO][4380] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:10.539513 env[1237]: 2024-07-02 07:58:10.534 [WARNING][4380] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" HandleID="k8s-pod-network.b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" Jul 2 07:58:10.539513 env[1237]: 2024-07-02 07:58:10.534 [INFO][4380] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" HandleID="k8s-pod-network.b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" Jul 2 07:58:10.539513 env[1237]: 2024-07-02 07:58:10.536 [INFO][4380] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:10.539513 env[1237]: 2024-07-02 07:58:10.537 [INFO][4373] k8s.go 621: Teardown processing complete. ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Jul 2 07:58:10.540576 env[1237]: time="2024-07-02T07:58:10.539558312Z" level=info msg="TearDown network for sandbox \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\" successfully" Jul 2 07:58:10.540576 env[1237]: time="2024-07-02T07:58:10.539598589Z" level=info msg="StopPodSandbox for \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\" returns successfully" Jul 2 07:58:10.540576 env[1237]: time="2024-07-02T07:58:10.540160014Z" level=info msg="RemovePodSandbox for \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\"" Jul 2 07:58:10.540576 env[1237]: time="2024-07-02T07:58:10.540205321Z" level=info msg="Forcibly stopping sandbox \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\"" Jul 2 07:58:10.730305 env[1237]: 2024-07-02 07:58:10.648 [WARNING][4401] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0", GenerateName:"calico-kube-controllers-7bf6c8cb-", Namespace:"calico-system", SelfLink:"", UID:"41b6dc6f-519b-4482-a5ad-eb2bf5a550b7", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bf6c8cb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"c5f7d010220043b01de0b8eefaf6b260513cd6735a672f6720ac38491b66694e", Pod:"calico-kube-controllers-7bf6c8cb-74b2c", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.123.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali69fc1473e4f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:10.730305 env[1237]: 2024-07-02 07:58:10.648 [INFO][4401] k8s.go 608: Cleaning up netns ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Jul 2 07:58:10.730305 env[1237]: 2024-07-02 07:58:10.649 [INFO][4401] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" iface="eth0" netns="" Jul 2 07:58:10.730305 env[1237]: 2024-07-02 07:58:10.649 [INFO][4401] k8s.go 615: Releasing IP address(es) ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Jul 2 07:58:10.730305 env[1237]: 2024-07-02 07:58:10.649 [INFO][4401] utils.go 188: Calico CNI releasing IP address ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Jul 2 07:58:10.730305 env[1237]: 2024-07-02 07:58:10.713 [INFO][4407] ipam_plugin.go 411: Releasing address using handleID ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" HandleID="k8s-pod-network.b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" Jul 2 07:58:10.730305 env[1237]: 2024-07-02 07:58:10.714 [INFO][4407] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:10.730305 env[1237]: 2024-07-02 07:58:10.714 [INFO][4407] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:10.730305 env[1237]: 2024-07-02 07:58:10.723 [WARNING][4407] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" HandleID="k8s-pod-network.b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" Jul 2 07:58:10.730305 env[1237]: 2024-07-02 07:58:10.723 [INFO][4407] ipam_plugin.go 439: Releasing address using workloadID ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" HandleID="k8s-pod-network.b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bf6c8cb--74b2c-eth0" Jul 2 07:58:10.730305 env[1237]: 2024-07-02 07:58:10.726 [INFO][4407] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:10.730305 env[1237]: 2024-07-02 07:58:10.728 [INFO][4401] k8s.go 621: Teardown processing complete. ContainerID="b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019" Jul 2 07:58:10.731167 env[1237]: time="2024-07-02T07:58:10.730342635Z" level=info msg="TearDown network for sandbox \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\" successfully" Jul 2 07:58:10.735848 env[1237]: time="2024-07-02T07:58:10.735782288Z" level=info msg="RemovePodSandbox \"b37964606e388056b69ead88500d5c9ef4e9ae991532020f4ba41650fe71c019\" returns successfully" Jul 2 07:58:10.736982 env[1237]: time="2024-07-02T07:58:10.736948445Z" level=info msg="StopPodSandbox for \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\"" Jul 2 07:58:10.906888 systemd[1]: run-containerd-runc-k8s.io-0cd1e2824c6d6c8369cae7d3c992222bdf18c72481d7cad937dbb58f7c66c5c1-runc.tyCOuV.mount: Deactivated successfully. Jul 2 07:58:11.031544 env[1237]: 2024-07-02 07:58:10.869 [WARNING][4427] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"6e423b60-704e-420e-9590-f0e5b18595c2", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61", Pod:"coredns-7db6d8ff4d-cxbn9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic5499d70949", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:11.031544 env[1237]: 2024-07-02 07:58:10.870 [INFO][4427] k8s.go 608: Cleaning up netns ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Jul 2 07:58:11.031544 env[1237]: 2024-07-02 07:58:10.870 [INFO][4427] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" iface="eth0" netns="" Jul 2 07:58:11.031544 env[1237]: 2024-07-02 07:58:10.870 [INFO][4427] k8s.go 615: Releasing IP address(es) ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Jul 2 07:58:11.031544 env[1237]: 2024-07-02 07:58:10.870 [INFO][4427] utils.go 188: Calico CNI releasing IP address ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Jul 2 07:58:11.031544 env[1237]: 2024-07-02 07:58:10.965 [INFO][4439] ipam_plugin.go 411: Releasing address using handleID ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" HandleID="k8s-pod-network.aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" Jul 2 07:58:11.031544 env[1237]: 2024-07-02 07:58:10.968 [INFO][4439] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:11.031544 env[1237]: 2024-07-02 07:58:10.968 [INFO][4439] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:11.031544 env[1237]: 2024-07-02 07:58:11.022 [WARNING][4439] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" HandleID="k8s-pod-network.aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" Jul 2 07:58:11.031544 env[1237]: 2024-07-02 07:58:11.023 [INFO][4439] ipam_plugin.go 439: Releasing address using workloadID ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" HandleID="k8s-pod-network.aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" Jul 2 07:58:11.031544 env[1237]: 2024-07-02 07:58:11.027 [INFO][4439] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:11.031544 env[1237]: 2024-07-02 07:58:11.028 [INFO][4427] k8s.go 621: Teardown processing complete. ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Jul 2 07:58:11.033018 env[1237]: time="2024-07-02T07:58:11.032972488Z" level=info msg="TearDown network for sandbox \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\" successfully" Jul 2 07:58:11.033161 env[1237]: time="2024-07-02T07:58:11.033126712Z" level=info msg="StopPodSandbox for \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\" returns successfully" Jul 2 07:58:11.033808 env[1237]: time="2024-07-02T07:58:11.033774662Z" level=info msg="RemovePodSandbox for \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\"" Jul 2 07:58:11.034004 env[1237]: time="2024-07-02T07:58:11.033950222Z" level=info msg="Forcibly stopping sandbox \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\"" Jul 2 07:58:11.118281 env[1237]: time="2024-07-02T07:58:11.118217101Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:11.122988 env[1237]: time="2024-07-02T07:58:11.122936810Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:11.127294 env[1237]: time="2024-07-02T07:58:11.127248535Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:11.131707 env[1237]: time="2024-07-02T07:58:11.131635233Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 07:58:11.132541 env[1237]: time="2024-07-02T07:58:11.132491994Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:11.138367 env[1237]: time="2024-07-02T07:58:11.138305777Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 07:58:11.139791 env[1237]: time="2024-07-02T07:58:11.139735939Z" level=info msg="CreateContainer within sandbox \"eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 07:58:11.169525 env[1237]: time="2024-07-02T07:58:11.169465825Z" level=info msg="CreateContainer within sandbox \"eedf414c6ef34c4639fc04c8107a6ad13b9ac0958c5cc2545952a15ef031aac7\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"cc5b5c8a6b12bdc0f8954f328319e57f20534f01e5464cbf21f745a6b551b59a\"" Jul 2 07:58:11.170440 env[1237]: time="2024-07-02T07:58:11.170382712Z" level=info msg="StartContainer for \"cc5b5c8a6b12bdc0f8954f328319e57f20534f01e5464cbf21f745a6b551b59a\"" Jul 2 07:58:11.255243 systemd[1]: Started cri-containerd-cc5b5c8a6b12bdc0f8954f328319e57f20534f01e5464cbf21f745a6b551b59a.scope. Jul 2 07:58:11.263452 env[1237]: 2024-07-02 07:58:11.164 [WARNING][4473] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"6e423b60-704e-420e-9590-f0e5b18595c2", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"9644fd51d0ffe3d311b336ff1bde7d2a10a78b956335df3bc3318ce750644e61", Pod:"coredns-7db6d8ff4d-cxbn9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic5499d70949", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:11.263452 env[1237]: 2024-07-02 07:58:11.164 [INFO][4473] k8s.go 608: Cleaning up netns ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Jul 2 07:58:11.263452 env[1237]: 2024-07-02 07:58:11.164 [INFO][4473] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" iface="eth0" netns="" Jul 2 07:58:11.263452 env[1237]: 2024-07-02 07:58:11.164 [INFO][4473] k8s.go 615: Releasing IP address(es) ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Jul 2 07:58:11.263452 env[1237]: 2024-07-02 07:58:11.164 [INFO][4473] utils.go 188: Calico CNI releasing IP address ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Jul 2 07:58:11.263452 env[1237]: 2024-07-02 07:58:11.233 [INFO][4479] ipam_plugin.go 411: Releasing address using handleID ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" HandleID="k8s-pod-network.aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" Jul 2 07:58:11.263452 env[1237]: 2024-07-02 07:58:11.233 [INFO][4479] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:11.263452 env[1237]: 2024-07-02 07:58:11.234 [INFO][4479] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:11.263452 env[1237]: 2024-07-02 07:58:11.258 [WARNING][4479] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" HandleID="k8s-pod-network.aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" Jul 2 07:58:11.263452 env[1237]: 2024-07-02 07:58:11.258 [INFO][4479] ipam_plugin.go 439: Releasing address using workloadID ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" HandleID="k8s-pod-network.aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--cxbn9-eth0" Jul 2 07:58:11.263452 env[1237]: 2024-07-02 07:58:11.260 [INFO][4479] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:11.263452 env[1237]: 2024-07-02 07:58:11.262 [INFO][4473] k8s.go 621: Teardown processing complete. ContainerID="aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923" Jul 2 07:58:11.264328 env[1237]: time="2024-07-02T07:58:11.264270868Z" level=info msg="TearDown network for sandbox \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\" successfully" Jul 2 07:58:11.277196 env[1237]: time="2024-07-02T07:58:11.277120570Z" level=info msg="RemovePodSandbox \"aead9f1b690b7659a9cf6bc443adfa1909cb029bd98b3618b48140a72da15923\" returns successfully" Jul 2 07:58:11.278274 env[1237]: time="2024-07-02T07:58:11.278232935Z" level=info msg="StopPodSandbox for \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\"" Jul 2 07:58:11.291472 systemd[1]: Started sshd@10-10.128.0.73:22-147.75.109.163:42934.service. Jul 2 07:58:11.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.73:22-147.75.109.163:42934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:11.300133 kernel: kauditd_printk_skb: 157 callbacks suppressed Jul 2 07:58:11.300248 kernel: audit: type=1130 audit(1719907091.293:1199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.73:22-147.75.109.163:42934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:11.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.367517 kernel: audit: type=1400 audit(1719907091.329:1200): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.395740 env[1237]: time="2024-07-02T07:58:11.395692440Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:11.404266 env[1237]: time="2024-07-02T07:58:11.404220221Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:11.407031 env[1237]: time="2024-07-02T07:58:11.406994035Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:11.409512 kernel: audit: type=1400 audit(1719907091.329:1201): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.417340 env[1237]: time="2024-07-02T07:58:11.417298239Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:58:11.419997 env[1237]: time="2024-07-02T07:58:11.419953440Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 07:58:11.425330 env[1237]: time="2024-07-02T07:58:11.425284209Z" level=info msg="CreateContainer within sandbox \"6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 07:58:11.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.448504 kernel: audit: type=1400 audit(1719907091.329:1202): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.455187 env[1237]: time="2024-07-02T07:58:11.455121986Z" level=info msg="StartContainer for \"cc5b5c8a6b12bdc0f8954f328319e57f20534f01e5464cbf21f745a6b551b59a\" returns successfully" Jul 2 07:58:11.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.479512 kernel: audit: type=1400 audit(1719907091.329:1203): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.480771 env[1237]: time="2024-07-02T07:58:11.480716087Z" level=info msg="CreateContainer within sandbox \"6e24714ac6bc5b4080f448198edb6198eb02049524f3cca895ce324545755349\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1f7b68ae140d88483a0e70a9480f36c10ddead74b2be123d2f84fb68aa35a386\"" Jul 2 07:58:11.482424 env[1237]: time="2024-07-02T07:58:11.482387204Z" level=info msg="StartContainer for \"1f7b68ae140d88483a0e70a9480f36c10ddead74b2be123d2f84fb68aa35a386\"" Jul 2 07:58:11.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.524534 kernel: audit: type=1400 audit(1719907091.329:1204): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.567503 kernel: audit: type=1400 audit(1719907091.329:1205): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.574254 systemd[1]: Started cri-containerd-1f7b68ae140d88483a0e70a9480f36c10ddead74b2be123d2f84fb68aa35a386.scope. Jul 2 07:58:11.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.610555 kernel: audit: type=1400 audit(1719907091.329:1206): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.638515 kernel: audit: type=1400 audit(1719907091.329:1207): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.662559 kernel: audit: type=1400 audit(1719907091.329:1208): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.330000 audit: BPF prog-id=191 op=LOAD Jul 2 07:58:11.330000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.330000 audit[4491]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4185 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363356235633861366231326264633066383935346633323833313965 Jul 2 07:58:11.331000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.331000 audit[4491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4185 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363356235633861366231326264633066383935346633323833313965 Jul 2 07:58:11.331000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.331000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.331000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.331000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.331000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.331000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.331000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.331000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.331000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.331000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.331000 audit: BPF prog-id=192 op=LOAD Jul 2 07:58:11.331000 audit[4491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00024a940 items=0 ppid=4185 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363356235633861366231326264633066383935346633323833313965 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit: BPF prog-id=193 op=LOAD Jul 2 07:58:11.332000 audit[4491]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00024a988 items=0 ppid=4185 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363356235633861366231326264633066383935346633323833313965 Jul 2 07:58:11.332000 audit: BPF prog-id=193 op=UNLOAD Jul 2 07:58:11.332000 audit: BPF prog-id=192 op=UNLOAD Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.332000 audit: BPF prog-id=194 op=LOAD Jul 2 07:58:11.332000 audit[4491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00024ad98 items=0 ppid=4185 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363356235633861366231326264633066383935346633323833313965 Jul 2 07:58:11.669000 audit[4514]: USER_ACCT pid=4514 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:11.675622 sshd[4514]: Accepted publickey for core from 147.75.109.163 port 42934 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:11.674000 audit[4514]: CRED_ACQ pid=4514 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:11.675000 audit[4514]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1fce7710 a2=3 a3=0 items=0 ppid=1 pid=4514 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.675000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:11.676794 sshd[4514]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:11.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.681000 audit: BPF prog-id=195 op=LOAD Jul 2 07:58:11.694601 systemd-logind[1222]: New session 11 of user core. Jul 2 07:58:11.696520 systemd[1]: Started session-11.scope. Jul 2 07:58:11.704000 audit[4514]: USER_START pid=4514 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:11.707000 audit[4568]: CRED_ACQ pid=4568 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4256 pid=4548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376236386165313430643838343833613065373061393438306633 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4256 pid=4548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376236386165313430643838343833613065373061393438306633 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit: BPF prog-id=196 op=LOAD Jul 2 07:58:11.710000 audit[4548]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024b40 items=0 ppid=4256 pid=4548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376236386165313430643838343833613065373061393438306633 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit: BPF prog-id=197 op=LOAD Jul 2 07:58:11.710000 audit[4548]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024b88 items=0 ppid=4256 pid=4548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376236386165313430643838343833613065373061393438306633 Jul 2 07:58:11.710000 audit: BPF prog-id=197 op=UNLOAD Jul 2 07:58:11.710000 audit: BPF prog-id=196 op=UNLOAD Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { perfmon } for pid=4548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit[4548]: AVC avc: denied { bpf } for pid=4548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:58:11.710000 audit: BPF prog-id=198 op=LOAD Jul 2 07:58:11.710000 audit[4548]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024f98 items=0 ppid=4256 pid=4548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:11.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166376236386165313430643838343833613065373061393438306633 Jul 2 07:58:11.806265 env[1237]: 2024-07-02 07:58:11.725 [WARNING][4525] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73", ResourceVersion:"771", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637", Pod:"csi-node-driver-wwmcp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.123.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali56dbd545462", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:11.806265 env[1237]: 2024-07-02 07:58:11.726 [INFO][4525] k8s.go 608: Cleaning up netns ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Jul 2 07:58:11.806265 env[1237]: 2024-07-02 07:58:11.726 [INFO][4525] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" iface="eth0" netns="" Jul 2 07:58:11.806265 env[1237]: 2024-07-02 07:58:11.726 [INFO][4525] k8s.go 615: Releasing IP address(es) ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Jul 2 07:58:11.806265 env[1237]: 2024-07-02 07:58:11.726 [INFO][4525] utils.go 188: Calico CNI releasing IP address ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Jul 2 07:58:11.806265 env[1237]: 2024-07-02 07:58:11.784 [INFO][4570] ipam_plugin.go 411: Releasing address using handleID ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" HandleID="k8s-pod-network.8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" Jul 2 07:58:11.806265 env[1237]: 2024-07-02 07:58:11.784 [INFO][4570] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:11.806265 env[1237]: 2024-07-02 07:58:11.784 [INFO][4570] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:11.806265 env[1237]: 2024-07-02 07:58:11.799 [WARNING][4570] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" HandleID="k8s-pod-network.8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" Jul 2 07:58:11.806265 env[1237]: 2024-07-02 07:58:11.799 [INFO][4570] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" HandleID="k8s-pod-network.8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" Jul 2 07:58:11.806265 env[1237]: 2024-07-02 07:58:11.803 [INFO][4570] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:11.806265 env[1237]: 2024-07-02 07:58:11.804 [INFO][4525] k8s.go 621: Teardown processing complete. ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Jul 2 07:58:11.807364 env[1237]: time="2024-07-02T07:58:11.807294155Z" level=info msg="TearDown network for sandbox \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\" successfully" Jul 2 07:58:11.807567 env[1237]: time="2024-07-02T07:58:11.807536337Z" level=info msg="StopPodSandbox for \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\" returns successfully" Jul 2 07:58:11.808646 env[1237]: time="2024-07-02T07:58:11.808424550Z" level=info msg="RemovePodSandbox for \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\"" Jul 2 07:58:11.808897 env[1237]: time="2024-07-02T07:58:11.808823596Z" level=info msg="Forcibly stopping sandbox \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\"" Jul 2 07:58:12.035731 env[1237]: time="2024-07-02T07:58:12.035672249Z" level=info msg="StartContainer for \"1f7b68ae140d88483a0e70a9480f36c10ddead74b2be123d2f84fb68aa35a386\" returns successfully" Jul 2 07:58:12.043115 env[1237]: 2024-07-02 07:58:11.916 [WARNING][4590] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d3fe7165-e5c9-4bdf-8cb0-2709b4a3ae73", ResourceVersion:"771", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 57, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-5-fba4ead5e99014d51fb1.c.flatcar-212911.internal", ContainerID:"65ac7485da7923fe24ea4eef76277cf880562262f9e06aaed08569d616bec637", Pod:"csi-node-driver-wwmcp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.123.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali56dbd545462", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:58:12.043115 env[1237]: 2024-07-02 07:58:11.916 [INFO][4590] k8s.go 608: Cleaning up netns ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Jul 2 07:58:12.043115 env[1237]: 2024-07-02 07:58:11.916 [INFO][4590] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" iface="eth0" netns="" Jul 2 07:58:12.043115 env[1237]: 2024-07-02 07:58:11.916 [INFO][4590] k8s.go 615: Releasing IP address(es) ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Jul 2 07:58:12.043115 env[1237]: 2024-07-02 07:58:11.916 [INFO][4590] utils.go 188: Calico CNI releasing IP address ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Jul 2 07:58:12.043115 env[1237]: 2024-07-02 07:58:12.021 [INFO][4605] ipam_plugin.go 411: Releasing address using handleID ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" HandleID="k8s-pod-network.8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" Jul 2 07:58:12.043115 env[1237]: 2024-07-02 07:58:12.022 [INFO][4605] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:58:12.043115 env[1237]: 2024-07-02 07:58:12.022 [INFO][4605] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:58:12.043115 env[1237]: 2024-07-02 07:58:12.035 [WARNING][4605] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" HandleID="k8s-pod-network.8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" Jul 2 07:58:12.043115 env[1237]: 2024-07-02 07:58:12.035 [INFO][4605] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" HandleID="k8s-pod-network.8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Workload="ci--3510--3--5--fba4ead5e99014d51fb1.c.flatcar--212911.internal-k8s-csi--node--driver--wwmcp-eth0" Jul 2 07:58:12.043115 env[1237]: 2024-07-02 07:58:12.039 [INFO][4605] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:58:12.043115 env[1237]: 2024-07-02 07:58:12.041 [INFO][4590] k8s.go 621: Teardown processing complete. ContainerID="8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb" Jul 2 07:58:12.045652 env[1237]: time="2024-07-02T07:58:12.045604962Z" level=info msg="TearDown network for sandbox \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\" successfully" Jul 2 07:58:12.052319 env[1237]: time="2024-07-02T07:58:12.052246948Z" level=info msg="RemovePodSandbox \"8d380aef05b9fe5ac89763dd1674adf0544cc1ae428253b23c6f127a940009eb\" returns successfully" Jul 2 07:58:12.066698 sshd[4514]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:12.068000 audit[4514]: USER_END pid=4514 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:12.068000 audit[4514]: CRED_DISP pid=4514 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:12.072033 systemd-logind[1222]: Session 11 logged out. Waiting for processes to exit. Jul 2 07:58:12.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.73:22-147.75.109.163:42934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:12.074720 systemd[1]: sshd@10-10.128.0.73:22-147.75.109.163:42934.service: Deactivated successfully. Jul 2 07:58:12.075926 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 07:58:12.079888 systemd-logind[1222]: Removed session 11. Jul 2 07:58:12.241337 kubelet[2162]: I0702 07:58:12.241264 2162 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-789cd85475-49th9" podStartSLOduration=4.137731873 podStartE2EDuration="7.241238096s" podCreationTimestamp="2024-07-02 07:58:05 +0000 UTC" firstStartedPulling="2024-07-02 07:58:08.033580912 +0000 UTC m=+58.419268325" lastFinishedPulling="2024-07-02 07:58:11.137087153 +0000 UTC m=+61.522774548" observedRunningTime="2024-07-02 07:58:12.240689147 +0000 UTC m=+62.626376567" watchObservedRunningTime="2024-07-02 07:58:12.241238096 +0000 UTC m=+62.626925518" Jul 2 07:58:12.258756 kubelet[2162]: I0702 07:58:12.258684 2162 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-789cd85475-5b78z" podStartSLOduration=4.289192741 podStartE2EDuration="7.258661214s" podCreationTimestamp="2024-07-02 07:58:05 +0000 UTC" firstStartedPulling="2024-07-02 07:58:08.453023218 +0000 UTC m=+58.838710617" lastFinishedPulling="2024-07-02 07:58:11.422491688 +0000 UTC m=+61.808179090" observedRunningTime="2024-07-02 07:58:12.257841294 +0000 UTC m=+62.643528715" watchObservedRunningTime="2024-07-02 07:58:12.258661214 +0000 UTC m=+62.644348633" Jul 2 07:58:12.278000 audit[4627]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4627 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:12.278000 audit[4627]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff3ae68360 a2=0 a3=7fff3ae6834c items=0 ppid=2344 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.278000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:12.280000 audit[4627]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4627 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:12.280000 audit[4627]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff3ae68360 a2=0 a3=7fff3ae6834c items=0 ppid=2344 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.280000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:12.327000 audit[4629]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:12.327000 audit[4629]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffda5ae0570 a2=0 a3=7ffda5ae055c items=0 ppid=2344 pid=4629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.327000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:12.329000 audit[4629]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:12.329000 audit[4629]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffda5ae0570 a2=0 a3=7ffda5ae055c items=0 ppid=2344 pid=4629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:12.329000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:13.237510 kubelet[2162]: I0702 07:58:13.237467 2162 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:58:13.238357 kubelet[2162]: I0702 07:58:13.238327 2162 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:58:13.644000 audit[4558]: AVC avc: denied { watch } for pid=4558 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_58_06.1502621390/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c712 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c284,c712 tclass=file permissive=0 Jul 2 07:58:13.644000 audit[4558]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e21dc0 a2=fc6 a3=0 items=0 ppid=4256 pid=4558 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c712 key=(null) Jul 2 07:58:13.644000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:58:13.653000 audit[4503]: AVC avc: denied { watch } for pid=4503 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_07_58_06.1218332654/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c259,c952 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c259,c952 tclass=file permissive=0 Jul 2 07:58:13.653000 audit[4503]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000151ee0 a2=fc6 a3=0 items=0 ppid=4185 pid=4503 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c259,c952 key=(null) Jul 2 07:58:13.653000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 07:58:16.552474 systemd[1]: run-containerd-runc-k8s.io-0cd1e2824c6d6c8369cae7d3c992222bdf18c72481d7cad937dbb58f7c66c5c1-runc.eHfsAX.mount: Deactivated successfully. Jul 2 07:58:17.114328 systemd[1]: Started sshd@11-10.128.0.73:22-147.75.109.163:47988.service. Jul 2 07:58:17.132476 kernel: kauditd_printk_skb: 133 callbacks suppressed Jul 2 07:58:17.132663 kernel: audit: type=1130 audit(1719907097.113:1250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.73:22-147.75.109.163:47988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:17.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.73:22-147.75.109.163:47988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:17.443770 kernel: audit: type=1101 audit(1719907097.412:1251): pid=4651 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:17.412000 audit[4651]: USER_ACCT pid=4651 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:17.444142 sshd[4651]: Accepted publickey for core from 147.75.109.163 port 47988 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:17.445585 sshd[4651]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:17.444000 audit[4651]: CRED_ACQ pid=4651 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:17.457670 systemd[1]: Started session-12.scope. Jul 2 07:58:17.459998 systemd-logind[1222]: New session 12 of user core. Jul 2 07:58:17.472487 kernel: audit: type=1103 audit(1719907097.444:1252): pid=4651 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:17.444000 audit[4651]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9a845150 a2=3 a3=0 items=0 ppid=1 pid=4651 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:17.517689 kernel: audit: type=1006 audit(1719907097.444:1253): pid=4651 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Jul 2 07:58:17.517852 kernel: audit: type=1300 audit(1719907097.444:1253): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9a845150 a2=3 a3=0 items=0 ppid=1 pid=4651 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:17.517906 kernel: audit: type=1327 audit(1719907097.444:1253): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:17.444000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:17.472000 audit[4651]: USER_START pid=4651 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:17.527584 kernel: audit: type=1105 audit(1719907097.472:1254): pid=4651 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:17.483000 audit[4653]: CRED_ACQ pid=4653 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:17.585048 kernel: audit: type=1103 audit(1719907097.483:1255): pid=4653 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:17.739265 sshd[4651]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:17.742000 audit[4651]: USER_END pid=4651 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:17.745122 systemd[1]: sshd@11-10.128.0.73:22-147.75.109.163:47988.service: Deactivated successfully. Jul 2 07:58:17.746382 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 07:58:17.749566 systemd-logind[1222]: Session 12 logged out. Waiting for processes to exit. Jul 2 07:58:17.751219 systemd-logind[1222]: Removed session 12. Jul 2 07:58:17.778480 kernel: audit: type=1106 audit(1719907097.742:1256): pid=4651 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:17.778620 kernel: audit: type=1104 audit(1719907097.742:1257): pid=4651 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:17.742000 audit[4651]: CRED_DISP pid=4651 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:17.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.73:22-147.75.109.163:47988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:17.807139 systemd[1]: Started sshd@12-10.128.0.73:22-147.75.109.163:47990.service. Jul 2 07:58:17.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.73:22-147.75.109.163:47990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:18.099000 audit[4664]: USER_ACCT pid=4664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:18.101297 sshd[4664]: Accepted publickey for core from 147.75.109.163 port 47990 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:18.101000 audit[4664]: CRED_ACQ pid=4664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:18.101000 audit[4664]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe11ca75c0 a2=3 a3=0 items=0 ppid=1 pid=4664 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:18.101000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:18.102563 sshd[4664]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:18.109681 systemd[1]: Started session-13.scope. Jul 2 07:58:18.110289 systemd-logind[1222]: New session 13 of user core. Jul 2 07:58:18.117000 audit[4664]: USER_START pid=4664 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:18.120000 audit[4666]: CRED_ACQ pid=4666 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:18.446767 sshd[4664]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:18.448000 audit[4664]: USER_END pid=4664 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:18.448000 audit[4664]: CRED_DISP pid=4664 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:18.451702 systemd[1]: sshd@12-10.128.0.73:22-147.75.109.163:47990.service: Deactivated successfully. Jul 2 07:58:18.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.73:22-147.75.109.163:47990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:18.452888 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 07:58:18.453829 systemd-logind[1222]: Session 13 logged out. Waiting for processes to exit. Jul 2 07:58:18.455047 systemd-logind[1222]: Removed session 13. Jul 2 07:58:18.495397 systemd[1]: Started sshd@13-10.128.0.73:22-147.75.109.163:48004.service. Jul 2 07:58:18.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.73:22-147.75.109.163:48004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:18.787000 audit[4677]: USER_ACCT pid=4677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:18.789537 sshd[4677]: Accepted publickey for core from 147.75.109.163 port 48004 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:18.790000 audit[4677]: CRED_ACQ pid=4677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:18.790000 audit[4677]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff25835000 a2=3 a3=0 items=0 ppid=1 pid=4677 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:18.790000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:18.791787 sshd[4677]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:18.798697 systemd[1]: Started session-14.scope. Jul 2 07:58:18.799730 systemd-logind[1222]: New session 14 of user core. Jul 2 07:58:18.807000 audit[4677]: USER_START pid=4677 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:18.810000 audit[4679]: CRED_ACQ pid=4679 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:19.087018 sshd[4677]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:19.089000 audit[4677]: USER_END pid=4677 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:19.089000 audit[4677]: CRED_DISP pid=4677 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:19.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.73:22-147.75.109.163:48004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:19.092500 systemd[1]: sshd@13-10.128.0.73:22-147.75.109.163:48004.service: Deactivated successfully. Jul 2 07:58:19.092519 systemd-logind[1222]: Session 14 logged out. Waiting for processes to exit. Jul 2 07:58:19.094131 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 07:58:19.095447 systemd-logind[1222]: Removed session 14. Jul 2 07:58:24.048000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:24.057488 kernel: kauditd_printk_skb: 23 callbacks suppressed Jul 2 07:58:24.057745 kernel: audit: type=1400 audit(1719907104.048:1277): avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:24.048000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:24.107605 kernel: audit: type=1400 audit(1719907104.048:1278): avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:24.107858 kernel: audit: type=1300 audit(1719907104.048:1278): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dd9ce0 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:58:24.048000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dd9ce0 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:58:24.048000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:24.171493 kernel: audit: type=1327 audit(1719907104.048:1278): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:24.048000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:24.199495 kernel: audit: type=1400 audit(1719907104.048:1279): avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:24.048000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ea42c0 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:58:24.213659 systemd[1]: Started sshd@14-10.128.0.73:22-147.75.109.163:41808.service. Jul 2 07:58:24.048000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:24.264298 kernel: audit: type=1300 audit(1719907104.048:1279): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ea42c0 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:58:24.265020 kernel: audit: type=1327 audit(1719907104.048:1279): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:24.265100 kernel: audit: type=1400 audit(1719907104.048:1280): avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:24.048000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:58:24.048000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ea4560 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:58:24.325728 kernel: audit: type=1300 audit(1719907104.048:1280): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ea4560 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:58:24.355466 kernel: audit: type=1327 audit(1719907104.048:1280): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:24.048000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:24.048000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d638a0 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:58:24.048000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:58:24.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.73:22-147.75.109.163:41808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:24.598000 audit[4704]: USER_ACCT pid=4704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:24.600595 sshd[4704]: Accepted publickey for core from 147.75.109.163 port 41808 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:24.601000 audit[4704]: CRED_ACQ pid=4704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:24.601000 audit[4704]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7a382e70 a2=3 a3=0 items=0 ppid=1 pid=4704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:24.601000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:24.603837 sshd[4704]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:24.610968 systemd[1]: Started session-15.scope. Jul 2 07:58:24.611658 systemd-logind[1222]: New session 15 of user core. Jul 2 07:58:24.618000 audit[4704]: USER_START pid=4704 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:24.621000 audit[4706]: CRED_ACQ pid=4706 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:24.899618 sshd[4704]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:24.900000 audit[4704]: USER_END pid=4704 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:24.900000 audit[4704]: CRED_DISP pid=4704 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:24.904319 systemd[1]: sshd@14-10.128.0.73:22-147.75.109.163:41808.service: Deactivated successfully. Jul 2 07:58:24.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.73:22-147.75.109.163:41808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:24.905751 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 07:58:24.906878 systemd-logind[1222]: Session 15 logged out. Waiting for processes to exit. Jul 2 07:58:24.908180 systemd-logind[1222]: Removed session 15. Jul 2 07:58:29.948173 systemd[1]: Started sshd@15-10.128.0.73:22-147.75.109.163:41814.service. Jul 2 07:58:29.980881 kernel: kauditd_printk_skb: 13 callbacks suppressed Jul 2 07:58:29.981004 kernel: audit: type=1130 audit(1719907109.948:1290): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.73:22-147.75.109.163:41814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:29.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.73:22-147.75.109.163:41814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:30.248000 audit[4724]: USER_ACCT pid=4724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:30.280528 kernel: audit: type=1101 audit(1719907110.248:1291): pid=4724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:30.280679 sshd[4724]: Accepted publickey for core from 147.75.109.163 port 41814 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:30.282545 sshd[4724]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:30.279000 audit[4724]: CRED_ACQ pid=4724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:30.297873 systemd-logind[1222]: New session 16 of user core. Jul 2 07:58:30.298973 systemd[1]: Started session-16.scope. Jul 2 07:58:30.311992 kernel: audit: type=1103 audit(1719907110.279:1292): pid=4724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:30.330507 kernel: audit: type=1006 audit(1719907110.280:1293): pid=4724 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Jul 2 07:58:30.330647 kernel: audit: type=1300 audit(1719907110.280:1293): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe204773a0 a2=3 a3=0 items=0 ppid=1 pid=4724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:30.280000 audit[4724]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe204773a0 a2=3 a3=0 items=0 ppid=1 pid=4724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:30.280000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:30.308000 audit[4724]: USER_START pid=4724 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:30.401830 kernel: audit: type=1327 audit(1719907110.280:1293): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:30.402013 kernel: audit: type=1105 audit(1719907110.308:1294): pid=4724 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:30.312000 audit[4726]: CRED_ACQ pid=4726 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:30.429567 kernel: audit: type=1103 audit(1719907110.312:1295): pid=4726 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:30.578079 sshd[4724]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:30.579000 audit[4724]: USER_END pid=4724 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:30.583630 systemd-logind[1222]: Session 16 logged out. Waiting for processes to exit. Jul 2 07:58:30.585572 systemd[1]: sshd@15-10.128.0.73:22-147.75.109.163:41814.service: Deactivated successfully. Jul 2 07:58:30.586719 systemd[1]: session-16.scope: Deactivated successfully. Jul 2 07:58:30.588988 systemd-logind[1222]: Removed session 16. Jul 2 07:58:30.579000 audit[4724]: CRED_DISP pid=4724 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:30.638071 kernel: audit: type=1106 audit(1719907110.579:1296): pid=4724 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:30.638283 kernel: audit: type=1104 audit(1719907110.579:1297): pid=4724 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:30.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.73:22-147.75.109.163:41814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:35.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.73:22-147.75.109.163:39300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:35.625105 systemd[1]: Started sshd@16-10.128.0.73:22-147.75.109.163:39300.service. Jul 2 07:58:35.633448 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:58:35.633587 kernel: audit: type=1130 audit(1719907115.625:1299): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.73:22-147.75.109.163:39300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:35.927000 audit[4756]: USER_ACCT pid=4756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:35.959005 sshd[4756]: Accepted publickey for core from 147.75.109.163 port 39300 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:35.959549 kernel: audit: type=1101 audit(1719907115.927:1300): pid=4756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:35.959000 audit[4756]: CRED_ACQ pid=4756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:35.960830 sshd[4756]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:35.976445 systemd[1]: Started session-17.scope. Jul 2 07:58:35.978910 systemd-logind[1222]: New session 17 of user core. Jul 2 07:58:35.986464 kernel: audit: type=1103 audit(1719907115.959:1301): pid=4756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:35.959000 audit[4756]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1fff6560 a2=3 a3=0 items=0 ppid=1 pid=4756 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:36.031099 kernel: audit: type=1006 audit(1719907115.959:1302): pid=4756 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Jul 2 07:58:36.031270 kernel: audit: type=1300 audit(1719907115.959:1302): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1fff6560 a2=3 a3=0 items=0 ppid=1 pid=4756 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:36.031319 kernel: audit: type=1327 audit(1719907115.959:1302): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:35.959000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:35.992000 audit[4756]: USER_START pid=4756 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:36.073243 kernel: audit: type=1105 audit(1719907115.992:1303): pid=4756 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:36.073413 kernel: audit: type=1103 audit(1719907115.997:1304): pid=4758 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:35.997000 audit[4758]: CRED_ACQ pid=4758 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:36.294183 sshd[4756]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:36.296000 audit[4756]: USER_END pid=4756 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:36.301589 systemd[1]: sshd@16-10.128.0.73:22-147.75.109.163:39300.service: Deactivated successfully. Jul 2 07:58:36.302746 systemd[1]: session-17.scope: Deactivated successfully. Jul 2 07:58:36.305665 systemd-logind[1222]: Session 17 logged out. Waiting for processes to exit. Jul 2 07:58:36.307103 systemd-logind[1222]: Removed session 17. Jul 2 07:58:36.296000 audit[4756]: CRED_DISP pid=4756 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:36.354580 kernel: audit: type=1106 audit(1719907116.296:1305): pid=4756 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:36.354883 kernel: audit: type=1104 audit(1719907116.296:1306): pid=4756 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:36.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.73:22-147.75.109.163:39300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:40.855715 systemd[1]: run-containerd-runc-k8s.io-0cd1e2824c6d6c8369cae7d3c992222bdf18c72481d7cad937dbb58f7c66c5c1-runc.UXK6hz.mount: Deactivated successfully. Jul 2 07:58:41.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.73:22-147.75.109.163:39302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:41.343258 systemd[1]: Started sshd@17-10.128.0.73:22-147.75.109.163:39302.service. Jul 2 07:58:41.349026 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:58:41.349149 kernel: audit: type=1130 audit(1719907121.342:1308): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.73:22-147.75.109.163:39302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:41.637000 audit[4800]: USER_ACCT pid=4800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:41.641106 sshd[4800]: Accepted publickey for core from 147.75.109.163 port 39302 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:41.670507 kernel: audit: type=1101 audit(1719907121.637:1309): pid=4800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:41.670793 sshd[4800]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:41.678501 systemd-logind[1222]: New session 18 of user core. Jul 2 07:58:41.680074 systemd[1]: Started session-18.scope. Jul 2 07:58:41.668000 audit[4800]: CRED_ACQ pid=4800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:41.720889 kernel: audit: type=1103 audit(1719907121.668:1310): pid=4800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:41.721088 kernel: audit: type=1006 audit(1719907121.668:1311): pid=4800 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Jul 2 07:58:41.668000 audit[4800]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe01c61e0 a2=3 a3=0 items=0 ppid=1 pid=4800 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:41.759357 kernel: audit: type=1300 audit(1719907121.668:1311): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe01c61e0 a2=3 a3=0 items=0 ppid=1 pid=4800 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:41.668000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:41.769468 kernel: audit: type=1327 audit(1719907121.668:1311): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:41.769617 kernel: audit: type=1105 audit(1719907121.689:1312): pid=4800 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:41.689000 audit[4800]: USER_START pid=4800 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:41.802744 kernel: audit: type=1103 audit(1719907121.695:1313): pid=4802 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:41.695000 audit[4802]: CRED_ACQ pid=4802 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:42.014832 sshd[4800]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:42.016000 audit[4800]: USER_END pid=4800 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:42.020547 systemd[1]: sshd@17-10.128.0.73:22-147.75.109.163:39302.service: Deactivated successfully. Jul 2 07:58:42.021738 systemd[1]: session-18.scope: Deactivated successfully. Jul 2 07:58:42.024333 systemd-logind[1222]: Session 18 logged out. Waiting for processes to exit. Jul 2 07:58:42.025798 systemd-logind[1222]: Removed session 18. Jul 2 07:58:42.016000 audit[4800]: CRED_DISP pid=4800 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:42.066655 systemd[1]: Started sshd@18-10.128.0.73:22-147.75.109.163:39314.service. Jul 2 07:58:42.075312 kernel: audit: type=1106 audit(1719907122.016:1314): pid=4800 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:42.075467 kernel: audit: type=1104 audit(1719907122.016:1315): pid=4800 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:42.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.73:22-147.75.109.163:39302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:42.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.73:22-147.75.109.163:39314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:42.359000 audit[4812]: USER_ACCT pid=4812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:42.360946 sshd[4812]: Accepted publickey for core from 147.75.109.163 port 39314 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:42.361000 audit[4812]: CRED_ACQ pid=4812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:42.361000 audit[4812]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa27b06e0 a2=3 a3=0 items=0 ppid=1 pid=4812 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:42.361000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:42.363834 sshd[4812]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:42.371694 systemd[1]: Started session-19.scope. Jul 2 07:58:42.374280 systemd-logind[1222]: New session 19 of user core. Jul 2 07:58:42.381000 audit[4812]: USER_START pid=4812 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:42.383000 audit[4814]: CRED_ACQ pid=4814 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:42.719416 sshd[4812]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:42.720000 audit[4812]: USER_END pid=4812 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:42.720000 audit[4812]: CRED_DISP pid=4812 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:42.724256 systemd[1]: sshd@18-10.128.0.73:22-147.75.109.163:39314.service: Deactivated successfully. Jul 2 07:58:42.725671 systemd[1]: session-19.scope: Deactivated successfully. Jul 2 07:58:42.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.73:22-147.75.109.163:39314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:42.726849 systemd-logind[1222]: Session 19 logged out. Waiting for processes to exit. Jul 2 07:58:42.728180 systemd-logind[1222]: Removed session 19. Jul 2 07:58:42.768943 systemd[1]: Started sshd@19-10.128.0.73:22-147.75.109.163:52038.service. Jul 2 07:58:42.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.73:22-147.75.109.163:52038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:43.068000 audit[4822]: USER_ACCT pid=4822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:43.070607 sshd[4822]: Accepted publickey for core from 147.75.109.163 port 52038 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:43.070000 audit[4822]: CRED_ACQ pid=4822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:43.070000 audit[4822]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc468bd1b0 a2=3 a3=0 items=0 ppid=1 pid=4822 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:43.070000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:43.072782 sshd[4822]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:43.080329 systemd[1]: Started session-20.scope. Jul 2 07:58:43.081340 systemd-logind[1222]: New session 20 of user core. Jul 2 07:58:43.092000 audit[4822]: USER_START pid=4822 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:43.095000 audit[4824]: CRED_ACQ pid=4824 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:45.236000 audit[4834]: NETFILTER_CFG table=filter:119 family=2 entries=22 op=nft_register_rule pid=4834 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:45.236000 audit[4834]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7fffebeccd90 a2=0 a3=7fffebeccd7c items=0 ppid=2344 pid=4834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:45.241769 sshd[4822]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:45.244000 audit[4822]: USER_END pid=4822 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:45.244000 audit[4822]: CRED_DISP pid=4822 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:45.248502 systemd-logind[1222]: Session 20 logged out. Waiting for processes to exit. Jul 2 07:58:45.238000 audit[4834]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4834 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:45.250700 systemd[1]: sshd@19-10.128.0.73:22-147.75.109.163:52038.service: Deactivated successfully. Jul 2 07:58:45.251942 systemd[1]: session-20.scope: Deactivated successfully. Jul 2 07:58:45.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.73:22-147.75.109.163:52038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:45.238000 audit[4834]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffebeccd90 a2=0 a3=0 items=0 ppid=2344 pid=4834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.238000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:45.253501 systemd-logind[1222]: Removed session 20. Jul 2 07:58:45.263000 audit[4837]: NETFILTER_CFG table=filter:121 family=2 entries=34 op=nft_register_rule pid=4837 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:45.263000 audit[4837]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffe1ed89380 a2=0 a3=7ffe1ed8936c items=0 ppid=2344 pid=4837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.263000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:45.264000 audit[4837]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4837 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:45.264000 audit[4837]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe1ed89380 a2=0 a3=0 items=0 ppid=2344 pid=4837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.264000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:45.286109 systemd[1]: Started sshd@20-10.128.0.73:22-147.75.109.163:52046.service. Jul 2 07:58:45.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.73:22-147.75.109.163:52046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:45.577000 audit[4839]: USER_ACCT pid=4839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:45.578110 sshd[4839]: Accepted publickey for core from 147.75.109.163 port 52046 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:45.579000 audit[4839]: CRED_ACQ pid=4839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:45.580000 audit[4839]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc02b12f60 a2=3 a3=0 items=0 ppid=1 pid=4839 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:45.580000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:45.581267 sshd[4839]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:45.588655 systemd[1]: Started session-21.scope. Jul 2 07:58:45.589490 systemd-logind[1222]: New session 21 of user core. Jul 2 07:58:45.596000 audit[4839]: USER_START pid=4839 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:45.599000 audit[4841]: CRED_ACQ pid=4841 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:46.014123 sshd[4839]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:46.016000 audit[4839]: USER_END pid=4839 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:46.016000 audit[4839]: CRED_DISP pid=4839 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:46.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.73:22-147.75.109.163:52046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:46.019228 systemd-logind[1222]: Session 21 logged out. Waiting for processes to exit. Jul 2 07:58:46.019545 systemd[1]: sshd@20-10.128.0.73:22-147.75.109.163:52046.service: Deactivated successfully. Jul 2 07:58:46.020788 systemd[1]: session-21.scope: Deactivated successfully. Jul 2 07:58:46.022137 systemd-logind[1222]: Removed session 21. Jul 2 07:58:46.060598 systemd[1]: Started sshd@21-10.128.0.73:22-147.75.109.163:52054.service. Jul 2 07:58:46.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.73:22-147.75.109.163:52054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:46.350000 audit[4849]: USER_ACCT pid=4849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:46.351838 sshd[4849]: Accepted publickey for core from 147.75.109.163 port 52054 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:46.356716 kernel: kauditd_printk_skb: 47 callbacks suppressed Jul 2 07:58:46.356852 kernel: audit: type=1101 audit(1719907126.350:1349): pid=4849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:46.354612 sshd[4849]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:46.366586 systemd[1]: Started session-22.scope. Jul 2 07:58:46.368496 systemd-logind[1222]: New session 22 of user core. Jul 2 07:58:46.353000 audit[4849]: CRED_ACQ pid=4849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:46.416482 kernel: audit: type=1103 audit(1719907126.353:1350): pid=4849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:46.416666 kernel: audit: type=1006 audit(1719907126.353:1351): pid=4849 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Jul 2 07:58:46.353000 audit[4849]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeca38020 a2=3 a3=0 items=0 ppid=1 pid=4849 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:46.429617 kernel: audit: type=1300 audit(1719907126.353:1351): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeca38020 a2=3 a3=0 items=0 ppid=1 pid=4849 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:46.458147 kernel: audit: type=1327 audit(1719907126.353:1351): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:46.353000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:46.380000 audit[4849]: USER_START pid=4849 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:46.499960 kernel: audit: type=1105 audit(1719907126.380:1352): pid=4849 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:46.386000 audit[4851]: CRED_ACQ pid=4851 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:46.524506 kernel: audit: type=1103 audit(1719907126.386:1353): pid=4851 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:46.665923 sshd[4849]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:46.667000 audit[4849]: USER_END pid=4849 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:46.671223 systemd-logind[1222]: Session 22 logged out. Waiting for processes to exit. Jul 2 07:58:46.673647 systemd[1]: sshd@21-10.128.0.73:22-147.75.109.163:52054.service: Deactivated successfully. Jul 2 07:58:46.674801 systemd[1]: session-22.scope: Deactivated successfully. Jul 2 07:58:46.677341 systemd-logind[1222]: Removed session 22. Jul 2 07:58:46.702477 kernel: audit: type=1106 audit(1719907126.667:1354): pid=4849 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:46.702644 kernel: audit: type=1104 audit(1719907126.667:1355): pid=4849 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:46.667000 audit[4849]: CRED_DISP pid=4849 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:46.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.73:22-147.75.109.163:52054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:46.751604 kernel: audit: type=1131 audit(1719907126.673:1356): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.73:22-147.75.109.163:52054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:51.319000 audit[4868]: NETFILTER_CFG table=filter:123 family=2 entries=22 op=nft_register_rule pid=4868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:51.319000 audit[4868]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc3f1f5360 a2=0 a3=7ffc3f1f534c items=0 ppid=2344 pid=4868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:51.319000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:51.322000 audit[4868]: NETFILTER_CFG table=nat:124 family=2 entries=104 op=nft_register_chain pid=4868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:51.322000 audit[4868]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffc3f1f5360 a2=0 a3=7ffc3f1f534c items=0 ppid=2344 pid=4868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:51.322000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:51.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.73:22-147.75.109.163:52066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:51.713469 systemd[1]: Started sshd@22-10.128.0.73:22-147.75.109.163:52066.service. Jul 2 07:58:51.719221 kernel: kauditd_printk_skb: 6 callbacks suppressed Jul 2 07:58:51.719321 kernel: audit: type=1130 audit(1719907131.712:1359): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.73:22-147.75.109.163:52066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:52.012000 audit[4871]: USER_ACCT pid=4871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:52.014180 sshd[4871]: Accepted publickey for core from 147.75.109.163 port 52066 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:52.044479 kernel: audit: type=1101 audit(1719907132.012:1360): pid=4871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:52.045296 sshd[4871]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:52.042000 audit[4871]: CRED_ACQ pid=4871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:52.053416 systemd[1]: Started session-23.scope. Jul 2 07:58:52.055635 systemd-logind[1222]: New session 23 of user core. Jul 2 07:58:52.071487 kernel: audit: type=1103 audit(1719907132.042:1361): pid=4871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:52.071635 kernel: audit: type=1006 audit(1719907132.042:1362): pid=4871 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Jul 2 07:58:52.042000 audit[4871]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeba795370 a2=3 a3=0 items=0 ppid=1 pid=4871 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:52.088552 kernel: audit: type=1300 audit(1719907132.042:1362): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeba795370 a2=3 a3=0 items=0 ppid=1 pid=4871 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:52.042000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:52.125218 kernel: audit: type=1327 audit(1719907132.042:1362): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:52.125360 kernel: audit: type=1105 audit(1719907132.062:1363): pid=4871 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:52.062000 audit[4871]: USER_START pid=4871 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:52.158095 kernel: audit: type=1103 audit(1719907132.065:1364): pid=4873 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:52.065000 audit[4873]: CRED_ACQ pid=4873 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:52.309098 sshd[4871]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:52.310000 audit[4871]: USER_END pid=4871 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:52.314854 systemd[1]: sshd@22-10.128.0.73:22-147.75.109.163:52066.service: Deactivated successfully. Jul 2 07:58:52.315990 systemd[1]: session-23.scope: Deactivated successfully. Jul 2 07:58:52.318625 systemd-logind[1222]: Session 23 logged out. Waiting for processes to exit. Jul 2 07:58:52.320488 systemd-logind[1222]: Removed session 23. Jul 2 07:58:52.348491 kernel: audit: type=1106 audit(1719907132.310:1365): pid=4871 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:52.348660 kernel: audit: type=1104 audit(1719907132.310:1366): pid=4871 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:52.310000 audit[4871]: CRED_DISP pid=4871 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:52.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.73:22-147.75.109.163:52066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:52.673621 kubelet[2162]: I0702 07:58:52.673573 2162 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:58:52.728000 audit[4883]: NETFILTER_CFG table=filter:125 family=2 entries=9 op=nft_register_rule pid=4883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:52.728000 audit[4883]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcf077cec0 a2=0 a3=7ffcf077ceac items=0 ppid=2344 pid=4883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:52.728000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:52.731000 audit[4883]: NETFILTER_CFG table=nat:126 family=2 entries=51 op=nft_register_chain pid=4883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:58:52.731000 audit[4883]: SYSCALL arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffcf077cec0 a2=0 a3=7ffcf077ceac items=0 ppid=2344 pid=4883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:52.731000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:58:57.393513 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 2 07:58:57.393765 kernel: audit: type=1130 audit(1719907137.362:1370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.73:22-147.75.109.163:44568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:57.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.73:22-147.75.109.163:44568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:58:57.362973 systemd[1]: Started sshd@23-10.128.0.73:22-147.75.109.163:44568.service. Jul 2 07:58:57.667000 audit[4888]: USER_ACCT pid=4888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:57.698907 kernel: audit: type=1101 audit(1719907137.667:1371): pid=4888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:57.699046 sshd[4888]: Accepted publickey for core from 147.75.109.163 port 44568 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:58:57.699301 sshd[4888]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:58:57.697000 audit[4888]: CRED_ACQ pid=4888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:57.710200 systemd[1]: Started session-24.scope. Jul 2 07:58:57.710961 systemd-logind[1222]: New session 24 of user core. Jul 2 07:58:57.728239 kernel: audit: type=1103 audit(1719907137.697:1372): pid=4888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:57.728367 kernel: audit: type=1006 audit(1719907137.697:1373): pid=4888 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Jul 2 07:58:57.697000 audit[4888]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2d802750 a2=3 a3=0 items=0 ppid=1 pid=4888 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:57.745536 kernel: audit: type=1300 audit(1719907137.697:1373): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2d802750 a2=3 a3=0 items=0 ppid=1 pid=4888 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:58:57.697000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:57.774602 kernel: audit: type=1327 audit(1719907137.697:1373): proctitle=737368643A20636F7265205B707269765D Jul 2 07:58:57.720000 audit[4888]: USER_START pid=4888 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:57.815964 kernel: audit: type=1105 audit(1719907137.720:1374): pid=4888 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:57.724000 audit[4891]: CRED_ACQ pid=4891 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:57.841566 kernel: audit: type=1103 audit(1719907137.724:1375): pid=4891 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:58.011063 sshd[4888]: pam_unix(sshd:session): session closed for user core Jul 2 07:58:58.014000 audit[4888]: USER_END pid=4888 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:58.018203 systemd[1]: sshd@23-10.128.0.73:22-147.75.109.163:44568.service: Deactivated successfully. Jul 2 07:58:58.020294 systemd[1]: session-24.scope: Deactivated successfully. Jul 2 07:58:58.023151 systemd-logind[1222]: Session 24 logged out. Waiting for processes to exit. Jul 2 07:58:58.025196 systemd-logind[1222]: Removed session 24. Jul 2 07:58:58.014000 audit[4888]: CRED_DISP pid=4888 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:58.071588 kernel: audit: type=1106 audit(1719907138.014:1376): pid=4888 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:58.071854 kernel: audit: type=1104 audit(1719907138.014:1377): pid=4888 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:58:58.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.73:22-147.75.109.163:44568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:03.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.73:22-147.75.109.163:47854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:03.062086 systemd[1]: Started sshd@24-10.128.0.73:22-147.75.109.163:47854.service. Jul 2 07:59:03.070462 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 07:59:03.070601 kernel: audit: type=1130 audit(1719907143.060:1379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.73:22-147.75.109.163:47854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:03.375000 audit[4909]: USER_ACCT pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:03.407001 sshd[4909]: Accepted publickey for core from 147.75.109.163 port 47854 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:59:03.407486 kernel: audit: type=1101 audit(1719907143.375:1380): pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:03.406000 audit[4909]: CRED_ACQ pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:03.411082 sshd[4909]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:59:03.438057 systemd[1]: Started session-25.scope. Jul 2 07:59:03.441998 systemd-logind[1222]: New session 25 of user core. Jul 2 07:59:03.453461 kernel: audit: type=1103 audit(1719907143.406:1381): pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:03.453575 kernel: audit: type=1006 audit(1719907143.408:1382): pid=4909 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Jul 2 07:59:03.408000 audit[4909]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9e6e55d0 a2=3 a3=0 items=0 ppid=1 pid=4909 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:03.490170 kernel: audit: type=1300 audit(1719907143.408:1382): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9e6e55d0 a2=3 a3=0 items=0 ppid=1 pid=4909 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:03.490387 kernel: audit: type=1327 audit(1719907143.408:1382): proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:03.408000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:03.455000 audit[4909]: USER_START pid=4909 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:03.529311 kernel: audit: type=1105 audit(1719907143.455:1383): pid=4909 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:03.456000 audit[4911]: CRED_ACQ pid=4911 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:03.554482 kernel: audit: type=1103 audit(1719907143.456:1384): pid=4911 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:03.753000 audit[4909]: USER_END pid=4909 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:03.758460 systemd-logind[1222]: Session 25 logged out. Waiting for processes to exit. Jul 2 07:59:03.753305 sshd[4909]: pam_unix(sshd:session): session closed for user core Jul 2 07:59:03.760008 systemd[1]: sshd@24-10.128.0.73:22-147.75.109.163:47854.service: Deactivated successfully. Jul 2 07:59:03.761159 systemd[1]: session-25.scope: Deactivated successfully. Jul 2 07:59:03.762646 systemd-logind[1222]: Removed session 25. Jul 2 07:59:03.753000 audit[4909]: CRED_DISP pid=4909 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:03.812481 kernel: audit: type=1106 audit(1719907143.753:1385): pid=4909 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:03.812789 kernel: audit: type=1104 audit(1719907143.753:1386): pid=4909 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:03.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.73:22-147.75.109.163:47854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:04.308816 systemd[1]: run-containerd-runc-k8s.io-584e6bac2109c77cd7db2e85785a9310738dc00b990d500fa153bbfb153eda68-runc.8Ccs7c.mount: Deactivated successfully. Jul 2 07:59:05.614762 kubelet[2162]: I0702 07:59:05.614689 2162 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:59:05.673000 audit[4940]: NETFILTER_CFG table=filter:127 family=2 entries=8 op=nft_register_rule pid=4940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:05.673000 audit[4940]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe2e313a20 a2=0 a3=7ffe2e313a0c items=0 ppid=2344 pid=4940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:05.673000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:05.676000 audit[4940]: NETFILTER_CFG table=nat:128 family=2 entries=58 op=nft_register_chain pid=4940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:59:05.676000 audit[4940]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffe2e313a20 a2=0 a3=7ffe2e313a0c items=0 ppid=2344 pid=4940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:05.676000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:59:06.192000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:06.192000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c015bda150 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:59:06.192000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:59:06.197000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:06.197000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:06.197000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c015bda180 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:59:06.197000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c007abd6e0 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:59:06.197000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:59:06.197000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:59:06.226000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:06.226000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c015bda1b0 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:59:06.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:59:06.235000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:06.235000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0109ad5f0 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:59:06.235000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:59:06.236000 audit[1979]: AVC avc: denied { watch } for pid=1979 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:06.236000 audit[1979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c007abdb60 a2=fc6 a3=0 items=0 ppid=1838 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c461,c872 key=(null) Jul 2 07:59:06.236000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 07:59:07.358000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8258 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:07.358000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f55620 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:59:07.358000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:59:07.359000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8243 scontext=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 07:59:07.359000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00337e560 a2=fc6 a3=0 items=0 ppid=1877 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c387,c971 key=(null) Jul 2 07:59:07.359000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 07:59:08.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.73:22-147.75.109.163:47870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:08.799793 systemd[1]: Started sshd@25-10.128.0.73:22-147.75.109.163:47870.service. Jul 2 07:59:08.805527 kernel: kauditd_printk_skb: 31 callbacks suppressed Jul 2 07:59:08.805812 kernel: audit: type=1130 audit(1719907148.798:1398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.73:22-147.75.109.163:47870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:09.096000 audit[4942]: USER_ACCT pid=4942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:09.098360 sshd[4942]: Accepted publickey for core from 147.75.109.163 port 47870 ssh2: RSA SHA256:GSxC+U3gD/L2tgNRotlYHTLXvYsmaWMokGyA5lBCl2s Jul 2 07:59:09.128629 kernel: audit: type=1101 audit(1719907149.096:1399): pid=4942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:09.127000 audit[4942]: CRED_ACQ pid=4942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:09.129730 sshd[4942]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:59:09.150213 systemd[1]: Started session-26.scope. Jul 2 07:59:09.152133 systemd-logind[1222]: New session 26 of user core. Jul 2 07:59:09.155451 kernel: audit: type=1103 audit(1719907149.127:1400): pid=4942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:09.173495 kernel: audit: type=1006 audit(1719907149.127:1401): pid=4942 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Jul 2 07:59:09.173631 kernel: audit: type=1300 audit(1719907149.127:1401): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff67e9acf0 a2=3 a3=0 items=0 ppid=1 pid=4942 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:09.127000 audit[4942]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff67e9acf0 a2=3 a3=0 items=0 ppid=1 pid=4942 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:59:09.202079 kernel: audit: type=1327 audit(1719907149.127:1401): proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:09.127000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:59:09.213110 kernel: audit: type=1105 audit(1719907149.160:1402): pid=4942 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:09.160000 audit[4942]: USER_START pid=4942 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:09.170000 audit[4944]: CRED_ACQ pid=4944 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:09.268330 kernel: audit: type=1103 audit(1719907149.170:1403): pid=4944 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:09.446192 sshd[4942]: pam_unix(sshd:session): session closed for user core Jul 2 07:59:09.446000 audit[4942]: USER_END pid=4942 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:09.481464 kernel: audit: type=1106 audit(1719907149.446:1404): pid=4942 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:09.447000 audit[4942]: CRED_DISP pid=4942 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:59:09.483076 systemd[1]: sshd@25-10.128.0.73:22-147.75.109.163:47870.service: Deactivated successfully. Jul 2 07:59:09.484262 systemd[1]: session-26.scope: Deactivated successfully. Jul 2 07:59:09.486581 systemd-logind[1222]: Session 26 logged out. Waiting for processes to exit. Jul 2 07:59:09.488198 systemd-logind[1222]: Removed session 26. Jul 2 07:59:09.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.73:22-147.75.109.163:47870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:59:09.506558 kernel: audit: type=1104 audit(1719907149.447:1405): pid=4942 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success'