Jul 2 01:49:12.983235 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Jul 2 01:49:12.983255 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Jul 1 23:37:37 -00 2024 Jul 2 01:49:12.983263 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Jul 2 01:49:12.983271 kernel: printk: bootconsole [pl11] enabled Jul 2 01:49:12.983276 kernel: efi: EFI v2.70 by EDK II Jul 2 01:49:12.983281 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef2d698 RNG=0x3fd89998 MEMRESERVE=0x37b33f98 Jul 2 01:49:12.983288 kernel: random: crng init done Jul 2 01:49:12.983293 kernel: ACPI: Early table checksum verification disabled Jul 2 01:49:12.983299 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Jul 2 01:49:12.983304 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:12.983310 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:12.983317 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Jul 2 01:49:12.983322 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:12.983328 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:12.983334 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:12.983340 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:12.983347 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:12.983354 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:12.983360 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Jul 2 01:49:12.983366 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:12.983372 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Jul 2 01:49:12.983377 kernel: NUMA: Failed to initialise from firmware Jul 2 01:49:12.983383 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Jul 2 01:49:12.983389 kernel: NUMA: NODE_DATA [mem 0x1bf7f1900-0x1bf7f6fff] Jul 2 01:49:12.983395 kernel: Zone ranges: Jul 2 01:49:12.983401 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Jul 2 01:49:12.983406 kernel: DMA32 empty Jul 2 01:49:12.983414 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Jul 2 01:49:12.983419 kernel: Movable zone start for each node Jul 2 01:49:12.983425 kernel: Early memory node ranges Jul 2 01:49:12.983431 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Jul 2 01:49:12.983437 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Jul 2 01:49:12.983442 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Jul 2 01:49:12.983448 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Jul 2 01:49:12.983454 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Jul 2 01:49:12.983460 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Jul 2 01:49:12.983465 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Jul 2 01:49:12.983471 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Jul 2 01:49:12.983477 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Jul 2 01:49:12.983484 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Jul 2 01:49:12.983493 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Jul 2 01:49:12.983499 kernel: psci: probing for conduit method from ACPI. Jul 2 01:49:12.983505 kernel: psci: PSCIv1.1 detected in firmware. Jul 2 01:49:12.983511 kernel: psci: Using standard PSCI v0.2 function IDs Jul 2 01:49:12.983518 kernel: psci: MIGRATE_INFO_TYPE not supported. Jul 2 01:49:12.983524 kernel: psci: SMC Calling Convention v1.4 Jul 2 01:49:12.983530 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Jul 2 01:49:12.983536 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Jul 2 01:49:12.983542 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Jul 2 01:49:12.983549 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Jul 2 01:49:12.983555 kernel: pcpu-alloc: [0] 0 [0] 1 Jul 2 01:49:12.983561 kernel: Detected PIPT I-cache on CPU0 Jul 2 01:49:12.983567 kernel: CPU features: detected: GIC system register CPU interface Jul 2 01:49:12.983573 kernel: CPU features: detected: Hardware dirty bit management Jul 2 01:49:12.983579 kernel: CPU features: detected: Spectre-BHB Jul 2 01:49:12.983585 kernel: CPU features: kernel page table isolation forced ON by KASLR Jul 2 01:49:12.983593 kernel: CPU features: detected: Kernel page table isolation (KPTI) Jul 2 01:49:12.983599 kernel: CPU features: detected: ARM erratum 1418040 Jul 2 01:49:12.983605 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Jul 2 01:49:12.983611 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Jul 2 01:49:12.983617 kernel: Policy zone: Normal Jul 2 01:49:12.983624 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 01:49:12.983631 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 01:49:12.983637 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 01:49:12.983644 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 01:49:12.983650 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 01:49:12.983657 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Jul 2 01:49:12.983664 kernel: Memory: 3990260K/4194160K available (9792K kernel code, 2092K rwdata, 7572K rodata, 36352K init, 777K bss, 203900K reserved, 0K cma-reserved) Jul 2 01:49:12.983670 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 01:49:12.983676 kernel: trace event string verifier disabled Jul 2 01:49:12.983682 kernel: rcu: Preemptible hierarchical RCU implementation. Jul 2 01:49:12.983689 kernel: rcu: RCU event tracing is enabled. Jul 2 01:49:12.983695 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 01:49:12.983701 kernel: Trampoline variant of Tasks RCU enabled. Jul 2 01:49:12.983708 kernel: Tracing variant of Tasks RCU enabled. Jul 2 01:49:12.983714 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 01:49:12.983720 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 01:49:12.983728 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Jul 2 01:49:12.983734 kernel: GICv3: 960 SPIs implemented Jul 2 01:49:12.983740 kernel: GICv3: 0 Extended SPIs implemented Jul 2 01:49:12.983746 kernel: GICv3: Distributor has no Range Selector support Jul 2 01:49:12.983752 kernel: Root IRQ handler: gic_handle_irq Jul 2 01:49:12.983758 kernel: GICv3: 16 PPIs implemented Jul 2 01:49:12.983764 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Jul 2 01:49:12.983770 kernel: ITS: No ITS available, not enabling LPIs Jul 2 01:49:12.983777 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 01:49:12.983783 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Jul 2 01:49:12.983789 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Jul 2 01:49:12.983795 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Jul 2 01:49:12.987486 kernel: Console: colour dummy device 80x25 Jul 2 01:49:12.987499 kernel: printk: console [tty1] enabled Jul 2 01:49:12.987506 kernel: ACPI: Core revision 20210730 Jul 2 01:49:12.987513 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Jul 2 01:49:12.987520 kernel: pid_max: default: 32768 minimum: 301 Jul 2 01:49:12.987526 kernel: LSM: Security Framework initializing Jul 2 01:49:12.987533 kernel: SELinux: Initializing. Jul 2 01:49:12.987539 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 01:49:12.987546 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 01:49:12.987557 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Jul 2 01:49:12.987564 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Jul 2 01:49:12.987570 kernel: rcu: Hierarchical SRCU implementation. Jul 2 01:49:12.987576 kernel: Remapping and enabling EFI services. Jul 2 01:49:12.987582 kernel: smp: Bringing up secondary CPUs ... Jul 2 01:49:12.987589 kernel: Detected PIPT I-cache on CPU1 Jul 2 01:49:12.987595 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Jul 2 01:49:12.987601 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 01:49:12.987608 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Jul 2 01:49:12.987615 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 01:49:12.987622 kernel: SMP: Total of 2 processors activated. Jul 2 01:49:12.987628 kernel: CPU features: detected: 32-bit EL0 Support Jul 2 01:49:12.987635 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Jul 2 01:49:12.987641 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Jul 2 01:49:12.987648 kernel: CPU features: detected: CRC32 instructions Jul 2 01:49:12.987654 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Jul 2 01:49:12.987660 kernel: CPU features: detected: LSE atomic instructions Jul 2 01:49:12.987666 kernel: CPU features: detected: Privileged Access Never Jul 2 01:49:12.987674 kernel: CPU: All CPU(s) started at EL1 Jul 2 01:49:12.987681 kernel: alternatives: patching kernel code Jul 2 01:49:12.987691 kernel: devtmpfs: initialized Jul 2 01:49:12.987699 kernel: KASLR enabled Jul 2 01:49:12.987706 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 01:49:12.987713 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 01:49:12.987719 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 01:49:12.987726 kernel: SMBIOS 3.1.0 present. Jul 2 01:49:12.987732 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 11/28/2023 Jul 2 01:49:12.987739 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 01:49:12.987747 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Jul 2 01:49:12.987754 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jul 2 01:49:12.987761 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jul 2 01:49:12.987767 kernel: audit: initializing netlink subsys (disabled) Jul 2 01:49:12.987774 kernel: audit: type=2000 audit(0.086:1): state=initialized audit_enabled=0 res=1 Jul 2 01:49:12.987781 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 01:49:12.987787 kernel: cpuidle: using governor menu Jul 2 01:49:12.987795 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Jul 2 01:49:12.987824 kernel: ASID allocator initialised with 32768 entries Jul 2 01:49:12.987831 kernel: ACPI: bus type PCI registered Jul 2 01:49:12.987838 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 01:49:12.987845 kernel: Serial: AMBA PL011 UART driver Jul 2 01:49:12.987851 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 01:49:12.987858 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Jul 2 01:49:12.987865 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 01:49:12.987871 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Jul 2 01:49:12.987879 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 01:49:12.987886 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Jul 2 01:49:12.987893 kernel: ACPI: Added _OSI(Module Device) Jul 2 01:49:12.987899 kernel: ACPI: Added _OSI(Processor Device) Jul 2 01:49:12.987906 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 01:49:12.987912 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 01:49:12.987919 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 01:49:12.987926 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 01:49:12.987932 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 01:49:12.987940 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 01:49:12.987947 kernel: ACPI: Interpreter enabled Jul 2 01:49:12.987953 kernel: ACPI: Using GIC for interrupt routing Jul 2 01:49:12.987960 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Jul 2 01:49:12.987967 kernel: printk: console [ttyAMA0] enabled Jul 2 01:49:12.987973 kernel: printk: bootconsole [pl11] disabled Jul 2 01:49:12.987980 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Jul 2 01:49:12.987987 kernel: iommu: Default domain type: Translated Jul 2 01:49:12.987993 kernel: iommu: DMA domain TLB invalidation policy: strict mode Jul 2 01:49:12.988001 kernel: vgaarb: loaded Jul 2 01:49:12.988008 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 01:49:12.988014 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 01:49:12.988021 kernel: PTP clock support registered Jul 2 01:49:12.988028 kernel: Registered efivars operations Jul 2 01:49:12.988034 kernel: No ACPI PMU IRQ for CPU0 Jul 2 01:49:12.988041 kernel: No ACPI PMU IRQ for CPU1 Jul 2 01:49:12.988047 kernel: clocksource: Switched to clocksource arch_sys_counter Jul 2 01:49:12.988054 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 01:49:12.988062 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 01:49:12.988068 kernel: pnp: PnP ACPI init Jul 2 01:49:12.988075 kernel: pnp: PnP ACPI: found 0 devices Jul 2 01:49:12.988081 kernel: NET: Registered PF_INET protocol family Jul 2 01:49:12.988089 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 01:49:12.988096 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 2 01:49:12.988102 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 01:49:12.988109 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 01:49:12.988116 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 2 01:49:12.988124 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 2 01:49:12.988131 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 01:49:12.988138 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 01:49:12.988144 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 01:49:12.988151 kernel: PCI: CLS 0 bytes, default 64 Jul 2 01:49:12.988158 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Jul 2 01:49:12.988165 kernel: kvm [1]: HYP mode not available Jul 2 01:49:12.988171 kernel: Initialise system trusted keyrings Jul 2 01:49:12.988178 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 2 01:49:12.988185 kernel: Key type asymmetric registered Jul 2 01:49:12.988192 kernel: Asymmetric key parser 'x509' registered Jul 2 01:49:12.988199 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 01:49:12.988205 kernel: io scheduler mq-deadline registered Jul 2 01:49:12.988212 kernel: io scheduler kyber registered Jul 2 01:49:12.988218 kernel: io scheduler bfq registered Jul 2 01:49:12.988225 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 01:49:12.988231 kernel: thunder_xcv, ver 1.0 Jul 2 01:49:12.988238 kernel: thunder_bgx, ver 1.0 Jul 2 01:49:12.988246 kernel: nicpf, ver 1.0 Jul 2 01:49:12.988252 kernel: nicvf, ver 1.0 Jul 2 01:49:12.988382 kernel: rtc-efi rtc-efi.0: registered as rtc0 Jul 2 01:49:12.988450 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-07-02T01:49:12 UTC (1719884952) Jul 2 01:49:12.988459 kernel: efifb: probing for efifb Jul 2 01:49:12.988466 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Jul 2 01:49:12.988473 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Jul 2 01:49:12.988479 kernel: efifb: scrolling: redraw Jul 2 01:49:12.988488 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Jul 2 01:49:12.988495 kernel: Console: switching to colour frame buffer device 128x48 Jul 2 01:49:12.988501 kernel: fb0: EFI VGA frame buffer device Jul 2 01:49:12.988508 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Jul 2 01:49:12.988515 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 2 01:49:12.988521 kernel: NET: Registered PF_INET6 protocol family Jul 2 01:49:12.988528 kernel: Segment Routing with IPv6 Jul 2 01:49:12.988534 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 01:49:12.988541 kernel: NET: Registered PF_PACKET protocol family Jul 2 01:49:12.988549 kernel: Key type dns_resolver registered Jul 2 01:49:12.988555 kernel: registered taskstats version 1 Jul 2 01:49:12.988562 kernel: Loading compiled-in X.509 certificates Jul 2 01:49:12.988569 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: c418313b450e4055b23e41c11cb6dc415de0265d' Jul 2 01:49:12.988575 kernel: Key type .fscrypt registered Jul 2 01:49:12.988582 kernel: Key type fscrypt-provisioning registered Jul 2 01:49:12.988589 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 01:49:12.988595 kernel: ima: Allocated hash algorithm: sha1 Jul 2 01:49:12.988602 kernel: ima: No architecture policies found Jul 2 01:49:12.988610 kernel: clk: Disabling unused clocks Jul 2 01:49:12.988617 kernel: Freeing unused kernel memory: 36352K Jul 2 01:49:12.988623 kernel: Run /init as init process Jul 2 01:49:12.988630 kernel: with arguments: Jul 2 01:49:12.988636 kernel: /init Jul 2 01:49:12.988643 kernel: with environment: Jul 2 01:49:12.988649 kernel: HOME=/ Jul 2 01:49:12.988655 kernel: TERM=linux Jul 2 01:49:12.988662 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 01:49:12.988671 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 01:49:12.988680 systemd[1]: Detected virtualization microsoft. Jul 2 01:49:12.988688 systemd[1]: Detected architecture arm64. Jul 2 01:49:12.988695 systemd[1]: Running in initrd. Jul 2 01:49:12.988702 systemd[1]: No hostname configured, using default hostname. Jul 2 01:49:12.988709 systemd[1]: Hostname set to . Jul 2 01:49:12.988716 systemd[1]: Initializing machine ID from random generator. Jul 2 01:49:12.988725 systemd[1]: Queued start job for default target initrd.target. Jul 2 01:49:12.988732 systemd[1]: Started systemd-ask-password-console.path. Jul 2 01:49:12.988739 systemd[1]: Reached target cryptsetup.target. Jul 2 01:49:12.988746 systemd[1]: Reached target paths.target. Jul 2 01:49:12.988752 systemd[1]: Reached target slices.target. Jul 2 01:49:12.988760 systemd[1]: Reached target swap.target. Jul 2 01:49:12.988766 systemd[1]: Reached target timers.target. Jul 2 01:49:12.988774 systemd[1]: Listening on iscsid.socket. Jul 2 01:49:12.988783 systemd[1]: Listening on iscsiuio.socket. Jul 2 01:49:12.988790 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 01:49:12.988797 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 01:49:12.988855 systemd[1]: Listening on systemd-journald.socket. Jul 2 01:49:12.988863 systemd[1]: Listening on systemd-networkd.socket. Jul 2 01:49:12.988875 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 01:49:12.988882 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 01:49:12.988889 systemd[1]: Reached target sockets.target. Jul 2 01:49:12.988896 systemd[1]: Starting kmod-static-nodes.service... Jul 2 01:49:12.988906 systemd[1]: Finished network-cleanup.service. Jul 2 01:49:12.988913 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 01:49:12.988920 systemd[1]: Starting systemd-journald.service... Jul 2 01:49:12.988927 systemd[1]: Starting systemd-modules-load.service... Jul 2 01:49:12.988935 systemd[1]: Starting systemd-resolved.service... Jul 2 01:49:12.988942 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 01:49:12.988952 systemd-journald[276]: Journal started Jul 2 01:49:12.988995 systemd-journald[276]: Runtime Journal (/run/log/journal/ae30c99e0b20439a9fe8c9be10ea9e2d) is 8.0M, max 78.6M, 70.6M free. Jul 2 01:49:12.965934 systemd-modules-load[277]: Inserted module 'overlay' Jul 2 01:49:13.016158 systemd[1]: Started systemd-journald.service. Jul 2 01:49:13.016186 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 01:49:13.008975 systemd-resolved[278]: Positive Trust Anchors: Jul 2 01:49:13.049131 kernel: audit: type=1130 audit(1719884953.019:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.049157 kernel: Bridge firewalling registered Jul 2 01:49:13.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.008984 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 01:49:13.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.009010 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 01:49:13.148431 kernel: audit: type=1130 audit(1719884953.056:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.148454 kernel: audit: type=1130 audit(1719884953.083:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.148471 kernel: SCSI subsystem initialized Jul 2 01:49:13.148480 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 01:49:13.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.011145 systemd-resolved[278]: Defaulting to hostname 'linux'. Jul 2 01:49:13.175274 kernel: audit: type=1130 audit(1719884953.152:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.175300 kernel: device-mapper: uevent: version 1.0.3 Jul 2 01:49:13.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.037603 systemd[1]: Started systemd-resolved.service. Jul 2 01:49:13.207131 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 01:49:13.207158 kernel: audit: type=1130 audit(1719884953.179:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.044258 systemd-modules-load[277]: Inserted module 'br_netfilter' Jul 2 01:49:13.057130 systemd[1]: Finished kmod-static-nodes.service. Jul 2 01:49:13.084200 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 01:49:13.171431 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 01:49:13.180064 systemd[1]: Reached target nss-lookup.target. Jul 2 01:49:13.206501 systemd-modules-load[277]: Inserted module 'dm_multipath' Jul 2 01:49:13.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.215375 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 01:49:13.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.223098 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 01:49:13.317054 kernel: audit: type=1130 audit(1719884953.245:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.317468 kernel: audit: type=1130 audit(1719884953.270:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.317479 kernel: audit: type=1130 audit(1719884953.294:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.233174 systemd[1]: Finished systemd-modules-load.service. Jul 2 01:49:13.245875 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 01:49:13.270621 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 01:49:13.338601 dracut-cmdline[296]: dracut-dracut-053 Jul 2 01:49:13.360695 kernel: audit: type=1130 audit(1719884953.342:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.315427 systemd[1]: Starting dracut-cmdline.service... Jul 2 01:49:13.365342 dracut-cmdline[296]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 01:49:13.324477 systemd[1]: Starting systemd-sysctl.service... Jul 2 01:49:13.336482 systemd[1]: Finished systemd-sysctl.service. Jul 2 01:49:13.455829 kernel: Loading iSCSI transport class v2.0-870. Jul 2 01:49:13.470822 kernel: iscsi: registered transport (tcp) Jul 2 01:49:13.490730 kernel: iscsi: registered transport (qla4xxx) Jul 2 01:49:13.490749 kernel: QLogic iSCSI HBA Driver Jul 2 01:49:13.525424 systemd[1]: Finished dracut-cmdline.service. Jul 2 01:49:13.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:13.530369 systemd[1]: Starting dracut-pre-udev.service... Jul 2 01:49:13.581819 kernel: raid6: neonx8 gen() 13823 MB/s Jul 2 01:49:13.601813 kernel: raid6: neonx8 xor() 10828 MB/s Jul 2 01:49:13.623812 kernel: raid6: neonx4 gen() 13498 MB/s Jul 2 01:49:13.643811 kernel: raid6: neonx4 xor() 11326 MB/s Jul 2 01:49:13.663810 kernel: raid6: neonx2 gen() 12966 MB/s Jul 2 01:49:13.684812 kernel: raid6: neonx2 xor() 10327 MB/s Jul 2 01:49:13.705810 kernel: raid6: neonx1 gen() 10517 MB/s Jul 2 01:49:13.725815 kernel: raid6: neonx1 xor() 8755 MB/s Jul 2 01:49:13.746815 kernel: raid6: int64x8 gen() 6270 MB/s Jul 2 01:49:13.766811 kernel: raid6: int64x8 xor() 3544 MB/s Jul 2 01:49:13.787815 kernel: raid6: int64x4 gen() 7202 MB/s Jul 2 01:49:13.808816 kernel: raid6: int64x4 xor() 3854 MB/s Jul 2 01:49:13.828815 kernel: raid6: int64x2 gen() 6156 MB/s Jul 2 01:49:13.849811 kernel: raid6: int64x2 xor() 3321 MB/s Jul 2 01:49:13.871811 kernel: raid6: int64x1 gen() 5046 MB/s Jul 2 01:49:13.896477 kernel: raid6: int64x1 xor() 2648 MB/s Jul 2 01:49:13.896495 kernel: raid6: using algorithm neonx8 gen() 13823 MB/s Jul 2 01:49:13.896511 kernel: raid6: .... xor() 10828 MB/s, rmw enabled Jul 2 01:49:13.900841 kernel: raid6: using neon recovery algorithm Jul 2 01:49:13.922569 kernel: xor: measuring software checksum speed Jul 2 01:49:13.922581 kernel: 8regs : 17308 MB/sec Jul 2 01:49:13.932527 kernel: 32regs : 20760 MB/sec Jul 2 01:49:13.932538 kernel: arm64_neon : 27892 MB/sec Jul 2 01:49:13.932549 kernel: xor: using function: arm64_neon (27892 MB/sec) Jul 2 01:49:13.993818 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Jul 2 01:49:14.002781 systemd[1]: Finished dracut-pre-udev.service. Jul 2 01:49:14.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:14.011000 audit: BPF prog-id=7 op=LOAD Jul 2 01:49:14.011000 audit: BPF prog-id=8 op=LOAD Jul 2 01:49:14.013099 systemd[1]: Starting systemd-udevd.service... Jul 2 01:49:14.031501 systemd-udevd[475]: Using default interface naming scheme 'v252'. Jul 2 01:49:14.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:14.037463 systemd[1]: Started systemd-udevd.service. Jul 2 01:49:14.048595 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 01:49:14.062677 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation Jul 2 01:49:14.089705 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 01:49:14.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:14.095401 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 01:49:14.131678 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 01:49:14.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:14.183822 kernel: hv_vmbus: Vmbus version:5.3 Jul 2 01:49:14.195829 kernel: hv_vmbus: registering driver hyperv_keyboard Jul 2 01:49:14.195874 kernel: hv_vmbus: registering driver hid_hyperv Jul 2 01:49:14.197823 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Jul 2 01:49:14.224339 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Jul 2 01:49:14.224398 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Jul 2 01:49:14.232374 kernel: hv_vmbus: registering driver hv_netvsc Jul 2 01:49:14.232414 kernel: hv_vmbus: registering driver hv_storvsc Jul 2 01:49:14.244822 kernel: scsi host0: storvsc_host_t Jul 2 01:49:14.244992 kernel: scsi host1: storvsc_host_t Jul 2 01:49:14.252108 kernel: scsi 1:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Jul 2 01:49:14.260543 kernel: scsi 1:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Jul 2 01:49:14.285097 kernel: sr 1:0:0:2: [sr0] scsi-1 drive Jul 2 01:49:14.285307 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 2 01:49:14.297797 kernel: sd 1:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Jul 2 01:49:14.298011 kernel: sr 1:0:0:2: Attached scsi CD-ROM sr0 Jul 2 01:49:14.298107 kernel: sd 1:0:0:0: [sda] 4096-byte physical blocks Jul 2 01:49:14.302445 kernel: sd 1:0:0:0: [sda] Write Protect is off Jul 2 01:49:14.309986 kernel: sd 1:0:0:0: [sda] Mode Sense: 0f 00 10 00 Jul 2 01:49:14.310133 kernel: sd 1:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Jul 2 01:49:14.316821 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 01:49:14.321822 kernel: sd 1:0:0:0: [sda] Attached SCSI disk Jul 2 01:49:14.345821 kernel: hv_netvsc 000d3a06-9dcb-000d-3a06-9dcb000d3a06 eth0: VF slot 1 added Jul 2 01:49:14.353817 kernel: hv_vmbus: registering driver hv_pci Jul 2 01:49:14.360821 kernel: hv_pci caa926f6-f461-4212-81c4-a76c4e92457c: PCI VMBus probing: Using version 0x10004 Jul 2 01:49:14.376063 kernel: hv_pci caa926f6-f461-4212-81c4-a76c4e92457c: PCI host bridge to bus f461:00 Jul 2 01:49:14.376231 kernel: pci_bus f461:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Jul 2 01:49:14.382054 kernel: pci_bus f461:00: No busn resource found for root bus, will use [bus 00-ff] Jul 2 01:49:14.389279 kernel: pci f461:00:02.0: [15b3:1018] type 00 class 0x020000 Jul 2 01:49:14.409422 kernel: pci f461:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Jul 2 01:49:14.431852 kernel: pci f461:00:02.0: enabling Extended Tags Jul 2 01:49:14.450855 kernel: pci f461:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at f461:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Jul 2 01:49:14.462881 kernel: pci_bus f461:00: busn_res: [bus 00-ff] end is updated to 00 Jul 2 01:49:14.463045 kernel: pci f461:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Jul 2 01:49:14.505826 kernel: mlx5_core f461:00:02.0: firmware version: 16.30.1284 Jul 2 01:49:14.660832 kernel: mlx5_core f461:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Jul 2 01:49:14.678939 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 01:49:14.708841 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (534) Jul 2 01:49:14.722722 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 01:49:14.757620 kernel: hv_netvsc 000d3a06-9dcb-000d-3a06-9dcb000d3a06 eth0: VF registering: eth1 Jul 2 01:49:14.757865 kernel: mlx5_core f461:00:02.0 eth1: joined to eth0 Jul 2 01:49:14.770836 kernel: mlx5_core f461:00:02.0 enP62561s1: renamed from eth1 Jul 2 01:49:14.884244 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 01:49:14.897778 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 01:49:14.903314 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 01:49:14.914738 systemd[1]: Starting disk-uuid.service... Jul 2 01:49:14.942835 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 01:49:15.944197 disk-uuid[604]: The operation has completed successfully. Jul 2 01:49:15.953940 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 01:49:16.001337 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 01:49:16.005949 systemd[1]: Finished disk-uuid.service. Jul 2 01:49:16.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:16.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:16.019189 systemd[1]: Starting verity-setup.service... Jul 2 01:49:16.057772 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Jul 2 01:49:16.273147 systemd[1]: Found device dev-mapper-usr.device. Jul 2 01:49:16.283161 systemd[1]: Mounting sysusr-usr.mount... Jul 2 01:49:16.290823 systemd[1]: Finished verity-setup.service. Jul 2 01:49:16.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:16.347820 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 01:49:16.347840 systemd[1]: Mounted sysusr-usr.mount. Jul 2 01:49:16.351556 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 01:49:16.352283 systemd[1]: Starting ignition-setup.service... Jul 2 01:49:16.359003 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 01:49:16.397911 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 01:49:16.397964 kernel: BTRFS info (device sda6): using free space tree Jul 2 01:49:16.402278 kernel: BTRFS info (device sda6): has skinny extents Jul 2 01:49:16.444993 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 01:49:16.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:16.452000 audit: BPF prog-id=9 op=LOAD Jul 2 01:49:16.454079 systemd[1]: Starting systemd-networkd.service... Jul 2 01:49:16.476488 systemd-networkd[845]: lo: Link UP Jul 2 01:49:16.476499 systemd-networkd[845]: lo: Gained carrier Jul 2 01:49:16.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:16.477198 systemd-networkd[845]: Enumeration completed Jul 2 01:49:16.479590 systemd[1]: Started systemd-networkd.service. Jul 2 01:49:16.480158 systemd-networkd[845]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 01:49:16.483939 systemd[1]: Reached target network.target. Jul 2 01:49:16.491988 systemd[1]: Starting iscsiuio.service... Jul 2 01:49:16.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:16.503436 systemd[1]: Started iscsiuio.service. Jul 2 01:49:16.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:16.538495 iscsid[853]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 01:49:16.538495 iscsid[853]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 01:49:16.538495 iscsid[853]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 01:49:16.538495 iscsid[853]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 01:49:16.538495 iscsid[853]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 01:49:16.538495 iscsid[853]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 01:49:16.538495 iscsid[853]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 01:49:16.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:16.519550 systemd[1]: Starting iscsid.service... Jul 2 01:49:16.525333 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 01:49:16.529702 systemd[1]: Started iscsid.service. Jul 2 01:49:16.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:16.537868 systemd[1]: Starting dracut-initqueue.service... Jul 2 01:49:16.567483 systemd[1]: Finished dracut-initqueue.service. Jul 2 01:49:16.572108 systemd[1]: Reached target remote-fs-pre.target. Jul 2 01:49:16.589323 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 01:49:16.599411 systemd[1]: Reached target remote-fs.target. Jul 2 01:49:16.617265 systemd[1]: Starting dracut-pre-mount.service... Jul 2 01:49:16.634399 systemd[1]: Finished dracut-pre-mount.service. Jul 2 01:49:16.680539 kernel: mlx5_core f461:00:02.0 enP62561s1: Link up Jul 2 01:49:16.719953 kernel: hv_netvsc 000d3a06-9dcb-000d-3a06-9dcb000d3a06 eth0: Data path switched to VF: enP62561s1 Jul 2 01:49:16.720282 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:49:16.720148 systemd-networkd[845]: enP62561s1: Link UP Jul 2 01:49:16.720220 systemd-networkd[845]: eth0: Link UP Jul 2 01:49:16.720374 systemd-networkd[845]: eth0: Gained carrier Jul 2 01:49:16.731766 systemd-networkd[845]: enP62561s1: Gained carrier Jul 2 01:49:16.737192 systemd[1]: Finished ignition-setup.service. Jul 2 01:49:16.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:16.745977 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 01:49:16.754890 systemd-networkd[845]: eth0: DHCPv4 address 10.200.20.4/24, gateway 10.200.20.1 acquired from 168.63.129.16 Jul 2 01:49:18.492922 systemd-networkd[845]: eth0: Gained IPv6LL Jul 2 01:49:19.523283 ignition[869]: Ignition 2.14.0 Jul 2 01:49:19.526512 ignition[869]: Stage: fetch-offline Jul 2 01:49:19.526600 ignition[869]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:49:19.526629 ignition[869]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:49:19.543736 ignition[869]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:49:19.543924 ignition[869]: parsed url from cmdline: "" Jul 2 01:49:19.543927 ignition[869]: no config URL provided Jul 2 01:49:19.543935 ignition[869]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 01:49:19.543943 ignition[869]: no config at "/usr/lib/ignition/user.ign" Jul 2 01:49:19.543948 ignition[869]: failed to fetch config: resource requires networking Jul 2 01:49:19.581764 ignition[869]: Ignition finished successfully Jul 2 01:49:19.582683 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 01:49:19.614778 kernel: kauditd_printk_skb: 18 callbacks suppressed Jul 2 01:49:19.614814 kernel: audit: type=1130 audit(1719884959.589:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:19.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:19.591390 systemd[1]: Starting ignition-fetch.service... Jul 2 01:49:19.607892 ignition[875]: Ignition 2.14.0 Jul 2 01:49:19.607899 ignition[875]: Stage: fetch Jul 2 01:49:19.608011 ignition[875]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:49:19.608035 ignition[875]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:49:19.611183 ignition[875]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:49:19.614612 ignition[875]: parsed url from cmdline: "" Jul 2 01:49:19.614617 ignition[875]: no config URL provided Jul 2 01:49:19.614624 ignition[875]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 01:49:19.614650 ignition[875]: no config at "/usr/lib/ignition/user.ign" Jul 2 01:49:19.652796 ignition[875]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Jul 2 01:49:19.751284 ignition[875]: GET result: OK Jul 2 01:49:19.751390 ignition[875]: config has been read from IMDS userdata Jul 2 01:49:19.751448 ignition[875]: parsing config with SHA512: 60df98b7c6fb82d10c76b663529cf68cdde30e93ac4237dfabf45863efae0243a5b58c38215e79ef376084dfee9f5fc4b69bab64a74af225fcd5594ce6b00693 Jul 2 01:49:19.755204 unknown[875]: fetched base config from "system" Jul 2 01:49:19.755718 ignition[875]: fetch: fetch complete Jul 2 01:49:19.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:19.755211 unknown[875]: fetched base config from "system" Jul 2 01:49:19.793282 kernel: audit: type=1130 audit(1719884959.767:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:19.755722 ignition[875]: fetch: fetch passed Jul 2 01:49:19.755216 unknown[875]: fetched user config from "azure" Jul 2 01:49:19.755762 ignition[875]: Ignition finished successfully Jul 2 01:49:19.759774 systemd[1]: Finished ignition-fetch.service. Jul 2 01:49:19.830238 kernel: audit: type=1130 audit(1719884959.809:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:19.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:19.798398 ignition[881]: Ignition 2.14.0 Jul 2 01:49:19.785281 systemd[1]: Starting ignition-kargs.service... Jul 2 01:49:19.798405 ignition[881]: Stage: kargs Jul 2 01:49:19.864066 kernel: audit: type=1130 audit(1719884959.842:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:19.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:19.806186 systemd[1]: Finished ignition-kargs.service. Jul 2 01:49:19.798511 ignition[881]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:49:19.810956 systemd[1]: Starting ignition-disks.service... Jul 2 01:49:19.798535 ignition[881]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:49:19.838824 systemd[1]: Finished ignition-disks.service. Jul 2 01:49:19.801597 ignition[881]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:49:19.843192 systemd[1]: Reached target initrd-root-device.target. Jul 2 01:49:19.803876 ignition[881]: kargs: kargs passed Jul 2 01:49:19.864290 systemd[1]: Reached target local-fs-pre.target. Jul 2 01:49:19.803922 ignition[881]: Ignition finished successfully Jul 2 01:49:19.872010 systemd[1]: Reached target local-fs.target. Jul 2 01:49:19.820512 ignition[887]: Ignition 2.14.0 Jul 2 01:49:19.881958 systemd[1]: Reached target sysinit.target. Jul 2 01:49:19.820518 ignition[887]: Stage: disks Jul 2 01:49:19.889552 systemd[1]: Reached target basic.target. Jul 2 01:49:19.820627 ignition[887]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:49:19.901773 systemd[1]: Starting systemd-fsck-root.service... Jul 2 01:49:19.820649 ignition[887]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:49:19.823186 ignition[887]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:49:19.834964 ignition[887]: disks: disks passed Jul 2 01:49:19.835014 ignition[887]: Ignition finished successfully Jul 2 01:49:19.992880 systemd-fsck[895]: ROOT: clean, 614/7326000 files, 481075/7359488 blocks Jul 2 01:49:20.006784 systemd[1]: Finished systemd-fsck-root.service. Jul 2 01:49:20.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:20.031075 systemd[1]: Mounting sysroot.mount... Jul 2 01:49:20.039594 kernel: audit: type=1130 audit(1719884960.010:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:20.056826 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 01:49:20.057237 systemd[1]: Mounted sysroot.mount. Jul 2 01:49:20.060881 systemd[1]: Reached target initrd-root-fs.target. Jul 2 01:49:20.106574 systemd[1]: Mounting sysroot-usr.mount... Jul 2 01:49:20.111032 systemd[1]: Starting flatcar-metadata-hostname.service... Jul 2 01:49:20.118054 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 01:49:20.118096 systemd[1]: Reached target ignition-diskful.target. Jul 2 01:49:20.130354 systemd[1]: Mounted sysroot-usr.mount. Jul 2 01:49:20.189060 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 01:49:20.193785 systemd[1]: Starting initrd-setup-root.service... Jul 2 01:49:20.213826 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (906) Jul 2 01:49:20.230449 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 01:49:20.230495 kernel: BTRFS info (device sda6): using free space tree Jul 2 01:49:20.230506 initrd-setup-root[911]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 01:49:20.241090 kernel: BTRFS info (device sda6): has skinny extents Jul 2 01:49:20.246558 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 01:49:20.283451 initrd-setup-root[937]: cut: /sysroot/etc/group: No such file or directory Jul 2 01:49:20.306511 initrd-setup-root[945]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 01:49:20.314932 initrd-setup-root[953]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 01:49:20.818953 systemd[1]: Finished initrd-setup-root.service. Jul 2 01:49:20.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:20.842055 systemd[1]: Starting ignition-mount.service... Jul 2 01:49:20.853185 kernel: audit: type=1130 audit(1719884960.823:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:20.847670 systemd[1]: Starting sysroot-boot.service... Jul 2 01:49:20.857596 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 01:49:20.857699 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 01:49:20.901356 systemd[1]: Finished sysroot-boot.service. Jul 2 01:49:20.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:20.924856 kernel: audit: type=1130 audit(1719884960.905:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:20.932889 ignition[975]: INFO : Ignition 2.14.0 Jul 2 01:49:20.932889 ignition[975]: INFO : Stage: mount Jul 2 01:49:20.943060 ignition[975]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:49:20.943060 ignition[975]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:49:20.943060 ignition[975]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:49:20.943060 ignition[975]: INFO : mount: mount passed Jul 2 01:49:20.943060 ignition[975]: INFO : Ignition finished successfully Jul 2 01:49:20.999163 kernel: audit: type=1130 audit(1719884960.954:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:20.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:20.949949 systemd[1]: Finished ignition-mount.service. Jul 2 01:49:21.559734 coreos-metadata[905]: Jul 02 01:49:21.559 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Jul 2 01:49:21.569810 coreos-metadata[905]: Jul 02 01:49:21.569 INFO Fetch successful Jul 2 01:49:21.603917 coreos-metadata[905]: Jul 02 01:49:21.603 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Jul 2 01:49:21.617304 coreos-metadata[905]: Jul 02 01:49:21.617 INFO Fetch successful Jul 2 01:49:21.634733 coreos-metadata[905]: Jul 02 01:49:21.634 INFO wrote hostname ci-3510.3.5-a-6c47a6a388 to /sysroot/etc/hostname Jul 2 01:49:21.643668 systemd[1]: Finished flatcar-metadata-hostname.service. Jul 2 01:49:21.668824 kernel: audit: type=1130 audit(1719884961.647:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:21.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:21.649102 systemd[1]: Starting ignition-files.service... Jul 2 01:49:21.672894 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 01:49:21.688833 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (984) Jul 2 01:49:21.699291 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 01:49:21.699312 kernel: BTRFS info (device sda6): using free space tree Jul 2 01:49:21.699322 kernel: BTRFS info (device sda6): has skinny extents Jul 2 01:49:21.710985 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 01:49:21.724074 ignition[1003]: INFO : Ignition 2.14.0 Jul 2 01:49:21.724074 ignition[1003]: INFO : Stage: files Jul 2 01:49:21.732628 ignition[1003]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:49:21.732628 ignition[1003]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:49:21.732628 ignition[1003]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:49:21.732628 ignition[1003]: DEBUG : files: compiled without relabeling support, skipping Jul 2 01:49:21.732628 ignition[1003]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 01:49:21.732628 ignition[1003]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 01:49:21.827429 ignition[1003]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 01:49:21.834358 ignition[1003]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 01:49:21.834358 ignition[1003]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 01:49:21.834358 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Jul 2 01:49:21.834358 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Jul 2 01:49:21.827898 unknown[1003]: wrote ssh authorized keys file for user: core Jul 2 01:49:22.118992 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Jul 2 01:49:22.340910 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Jul 2 01:49:22.352666 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Jul 2 01:49:22.362077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 01:49:22.362077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 2 01:49:22.362077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 2 01:49:22.362077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 01:49:22.362077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 01:49:22.362077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 01:49:22.362077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 01:49:22.362077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 01:49:22.362077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 01:49:22.362077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.28.7-arm64.raw" Jul 2 01:49:22.362077 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.28.7-arm64.raw" Jul 2 01:49:22.487318 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1005) Jul 2 01:49:22.432686 systemd[1]: mnt-oem3097872979.mount: Deactivated successfully. Jul 2 01:49:22.493177 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Jul 2 01:49:22.493177 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 01:49:22.493177 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3097872979" Jul 2 01:49:22.493177 ignition[1003]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3097872979": device or resource busy Jul 2 01:49:22.493177 ignition[1003]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3097872979", trying btrfs: device or resource busy Jul 2 01:49:22.493177 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3097872979" Jul 2 01:49:22.493177 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3097872979" Jul 2 01:49:22.493177 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3097872979" Jul 2 01:49:22.493177 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3097872979" Jul 2 01:49:22.493177 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Jul 2 01:49:22.493177 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 01:49:22.493177 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 01:49:22.493177 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2972407258" Jul 2 01:49:22.493177 ignition[1003]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2972407258": device or resource busy Jul 2 01:49:22.457753 systemd[1]: mnt-oem2972407258.mount: Deactivated successfully. Jul 2 01:49:22.652887 ignition[1003]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2972407258", trying btrfs: device or resource busy Jul 2 01:49:22.652887 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2972407258" Jul 2 01:49:22.652887 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2972407258" Jul 2 01:49:22.652887 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem2972407258" Jul 2 01:49:22.652887 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem2972407258" Jul 2 01:49:22.652887 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 01:49:22.652887 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.28.7-arm64.raw" Jul 2 01:49:22.652887 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.28.7-arm64.raw: attempt #1 Jul 2 01:49:22.800768 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK Jul 2 01:49:23.010616 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.28.7-arm64.raw" Jul 2 01:49:23.010616 ignition[1003]: INFO : files: op(13): [started] processing unit "waagent.service" Jul 2 01:49:23.010616 ignition[1003]: INFO : files: op(13): [finished] processing unit "waagent.service" Jul 2 01:49:23.010616 ignition[1003]: INFO : files: op(14): [started] processing unit "nvidia.service" Jul 2 01:49:23.010616 ignition[1003]: INFO : files: op(14): [finished] processing unit "nvidia.service" Jul 2 01:49:23.010616 ignition[1003]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Jul 2 01:49:23.086062 kernel: audit: type=1130 audit(1719884963.026:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.022461 systemd[1]: Finished ignition-files.service. Jul 2 01:49:23.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.093942 ignition[1003]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 01:49:23.093942 ignition[1003]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 01:49:23.093942 ignition[1003]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Jul 2 01:49:23.093942 ignition[1003]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" Jul 2 01:49:23.093942 ignition[1003]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" Jul 2 01:49:23.093942 ignition[1003]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Jul 2 01:49:23.093942 ignition[1003]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Jul 2 01:49:23.093942 ignition[1003]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Jul 2 01:49:23.093942 ignition[1003]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Jul 2 01:49:23.093942 ignition[1003]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 01:49:23.093942 ignition[1003]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 01:49:23.093942 ignition[1003]: INFO : files: files passed Jul 2 01:49:23.093942 ignition[1003]: INFO : Ignition finished successfully Jul 2 01:49:23.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.049212 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 01:49:23.053875 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 01:49:23.263130 initrd-setup-root-after-ignition[1029]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 01:49:23.054589 systemd[1]: Starting ignition-quench.service... Jul 2 01:49:23.080278 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 01:49:23.080579 systemd[1]: Finished ignition-quench.service. Jul 2 01:49:23.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.090223 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 01:49:23.098791 systemd[1]: Reached target ignition-complete.target. Jul 2 01:49:23.113574 systemd[1]: Starting initrd-parse-etc.service... Jul 2 01:49:23.137923 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 01:49:23.138029 systemd[1]: Finished initrd-parse-etc.service. Jul 2 01:49:23.149239 systemd[1]: Reached target initrd-fs.target. Jul 2 01:49:23.161341 systemd[1]: Reached target initrd.target. Jul 2 01:49:23.173585 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 01:49:23.174405 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 01:49:23.225427 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 01:49:23.234573 systemd[1]: Starting initrd-cleanup.service... Jul 2 01:49:23.254468 systemd[1]: Stopped target nss-lookup.target. Jul 2 01:49:23.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.268229 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 01:49:23.282361 systemd[1]: Stopped target timers.target. Jul 2 01:49:23.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.295559 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 01:49:23.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.295676 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 01:49:23.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.304292 systemd[1]: Stopped target initrd.target. Jul 2 01:49:23.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.311538 systemd[1]: Stopped target basic.target. Jul 2 01:49:23.320061 systemd[1]: Stopped target ignition-complete.target. Jul 2 01:49:23.459724 iscsid[853]: iscsid shutting down. Jul 2 01:49:23.329197 systemd[1]: Stopped target ignition-diskful.target. Jul 2 01:49:23.471152 ignition[1042]: INFO : Ignition 2.14.0 Jul 2 01:49:23.471152 ignition[1042]: INFO : Stage: umount Jul 2 01:49:23.471152 ignition[1042]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:49:23.471152 ignition[1042]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:49:23.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.337935 systemd[1]: Stopped target initrd-root-device.target. Jul 2 01:49:23.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.525946 ignition[1042]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:49:23.525946 ignition[1042]: INFO : umount: umount passed Jul 2 01:49:23.525946 ignition[1042]: INFO : Ignition finished successfully Jul 2 01:49:23.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.347329 systemd[1]: Stopped target remote-fs.target. Jul 2 01:49:23.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.354940 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 01:49:23.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.362773 systemd[1]: Stopped target sysinit.target. Jul 2 01:49:23.369902 systemd[1]: Stopped target local-fs.target. Jul 2 01:49:23.379910 systemd[1]: Stopped target local-fs-pre.target. Jul 2 01:49:23.387708 systemd[1]: Stopped target swap.target. Jul 2 01:49:23.395081 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 01:49:23.395196 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 01:49:23.402884 systemd[1]: Stopped target cryptsetup.target. Jul 2 01:49:23.411364 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 01:49:23.411475 systemd[1]: Stopped dracut-initqueue.service. Jul 2 01:49:23.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.419702 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 01:49:23.419814 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 01:49:23.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.428337 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 01:49:23.428429 systemd[1]: Stopped ignition-files.service. Jul 2 01:49:23.436949 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Jul 2 01:49:23.437043 systemd[1]: Stopped flatcar-metadata-hostname.service. Jul 2 01:49:23.446083 systemd[1]: Stopping ignition-mount.service... Jul 2 01:49:23.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.459000 systemd[1]: Stopping iscsid.service... Jul 2 01:49:23.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.465753 systemd[1]: Stopping sysroot-boot.service... Jul 2 01:49:23.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.708000 audit: BPF prog-id=6 op=UNLOAD Jul 2 01:49:23.475854 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 01:49:23.476026 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 01:49:23.480770 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 01:49:23.480888 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 01:49:23.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.500717 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 01:49:23.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.500849 systemd[1]: Stopped iscsid.service. Jul 2 01:49:23.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.517098 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 01:49:23.517190 systemd[1]: Stopped ignition-mount.service. Jul 2 01:49:23.524194 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 01:49:23.524312 systemd[1]: Stopped ignition-disks.service. Jul 2 01:49:23.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.529908 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 01:49:23.530050 systemd[1]: Stopped ignition-kargs.service. Jul 2 01:49:23.551466 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 01:49:23.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.551606 systemd[1]: Stopped ignition-fetch.service. Jul 2 01:49:23.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.559514 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 01:49:23.848488 kernel: hv_netvsc 000d3a06-9dcb-000d-3a06-9dcb000d3a06 eth0: Data path switched from VF: enP62561s1 Jul 2 01:49:23.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.559652 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 01:49:23.568403 systemd[1]: Stopped target paths.target. Jul 2 01:49:23.579118 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 01:49:23.587833 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 01:49:23.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.595600 systemd[1]: Stopped target slices.target. Jul 2 01:49:23.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.603936 systemd[1]: Stopped target sockets.target. Jul 2 01:49:23.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.611217 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 01:49:23.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.611365 systemd[1]: Closed iscsid.socket. Jul 2 01:49:23.619282 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 01:49:23.619418 systemd[1]: Stopped ignition-setup.service. Jul 2 01:49:23.628427 systemd[1]: Stopping iscsiuio.service... Jul 2 01:49:23.638673 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 01:49:23.639330 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 01:49:23.639432 systemd[1]: Stopped iscsiuio.service. Jul 2 01:49:23.647766 systemd[1]: Stopped target network.target. Jul 2 01:49:23.654287 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 01:49:23.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.654331 systemd[1]: Closed iscsiuio.socket. Jul 2 01:49:23.663334 systemd[1]: Stopping systemd-networkd.service... Jul 2 01:49:23.672710 systemd-networkd[845]: eth0: DHCPv6 lease lost Jul 2 01:49:23.955000 audit: BPF prog-id=9 op=UNLOAD Jul 2 01:49:23.673969 systemd[1]: Stopping systemd-resolved.service... Jul 2 01:49:23.684183 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 01:49:23.684277 systemd[1]: Stopped systemd-networkd.service. Jul 2 01:49:23.693514 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 01:49:23.693597 systemd[1]: Finished initrd-cleanup.service. Jul 2 01:49:23.700955 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 01:49:23.701050 systemd[1]: Stopped systemd-resolved.service. Jul 2 01:49:23.709235 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 01:49:23.709276 systemd[1]: Closed systemd-networkd.socket. Jul 2 01:49:23.718240 systemd[1]: Stopping network-cleanup.service... Jul 2 01:49:23.730422 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 01:49:23.730497 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 01:49:23.740367 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 01:49:23.740413 systemd[1]: Stopped systemd-sysctl.service. Jul 2 01:49:23.751566 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 01:49:23.751605 systemd[1]: Stopped systemd-modules-load.service. Jul 2 01:49:23.757306 systemd[1]: Stopping systemd-udevd.service... Jul 2 01:49:23.765668 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 01:49:23.775390 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 01:49:23.775515 systemd[1]: Stopped systemd-udevd.service. Jul 2 01:49:23.786238 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 01:49:23.786275 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 01:49:23.795163 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 01:49:23.795203 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 01:49:23.805535 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 01:49:23.805582 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 01:49:23.813754 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 01:49:23.813862 systemd[1]: Stopped dracut-cmdline.service. Jul 2 01:49:23.832556 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 01:49:23.832606 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 01:49:23.847925 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 01:49:23.861211 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 2 01:49:23.861290 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 2 01:49:23.877296 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 01:49:23.877355 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 01:49:23.882113 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 01:49:23.882151 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 01:49:23.892244 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 2 01:49:23.892741 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 01:49:23.892827 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 01:49:23.937013 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 01:49:23.937125 systemd[1]: Stopped network-cleanup.service. Jul 2 01:49:24.202357 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 01:49:24.205826 systemd[1]: Stopped sysroot-boot.service. Jul 2 01:49:24.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.210831 systemd[1]: Reached target initrd-switch-root.target. Jul 2 01:49:24.218535 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 01:49:24.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.218589 systemd[1]: Stopped initrd-setup-root.service. Jul 2 01:49:24.227334 systemd[1]: Starting initrd-switch-root.service... Jul 2 01:49:24.244904 systemd[1]: Switching root. Jul 2 01:49:24.267722 systemd-journald[276]: Journal stopped Jul 2 01:49:35.182589 systemd-journald[276]: Received SIGTERM from PID 1 (systemd). Jul 2 01:49:35.182610 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 01:49:35.182622 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 01:49:35.182631 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 01:49:35.182639 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 01:49:35.182647 kernel: SELinux: policy capability open_perms=1 Jul 2 01:49:35.182655 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 01:49:35.182663 kernel: SELinux: policy capability always_check_network=0 Jul 2 01:49:35.182671 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 01:49:35.182682 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 01:49:35.182690 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 01:49:35.182698 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 01:49:35.182707 kernel: kauditd_printk_skb: 43 callbacks suppressed Jul 2 01:49:35.182715 kernel: audit: type=1403 audit(1719884966.329:82): auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 01:49:35.182725 systemd[1]: Successfully loaded SELinux policy in 252.558ms. Jul 2 01:49:35.182736 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.324ms. Jul 2 01:49:35.182746 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 01:49:35.182756 systemd[1]: Detected virtualization microsoft. Jul 2 01:49:35.182765 systemd[1]: Detected architecture arm64. Jul 2 01:49:35.182774 systemd[1]: Detected first boot. Jul 2 01:49:35.182783 systemd[1]: Hostname set to . Jul 2 01:49:35.182793 systemd[1]: Initializing machine ID from random generator. Jul 2 01:49:35.182814 kernel: audit: type=1400 audit(1719884966.955:83): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:49:35.182824 kernel: audit: type=1400 audit(1719884966.955:84): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:49:35.182833 kernel: audit: type=1334 audit(1719884966.970:85): prog-id=10 op=LOAD Jul 2 01:49:35.182841 kernel: audit: type=1334 audit(1719884966.970:86): prog-id=10 op=UNLOAD Jul 2 01:49:35.182850 kernel: audit: type=1334 audit(1719884966.985:87): prog-id=11 op=LOAD Jul 2 01:49:35.182858 kernel: audit: type=1334 audit(1719884966.985:88): prog-id=11 op=UNLOAD Jul 2 01:49:35.182868 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 01:49:35.182878 kernel: audit: type=1400 audit(1719884968.223:89): avc: denied { associate } for pid=1076 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 01:49:35.182889 kernel: audit: type=1300 audit(1719884968.223:89): arch=c00000b7 syscall=5 success=yes exit=0 a0=4000022284 a1=4000028360 a2=40000267c0 a3=32 items=0 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:49:35.182899 kernel: audit: type=1327 audit(1719884968.223:89): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 01:49:35.182908 systemd[1]: Populated /etc with preset unit settings. Jul 2 01:49:35.182918 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 01:49:35.182928 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 01:49:35.182939 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 01:49:35.182948 kernel: kauditd_printk_skb: 6 callbacks suppressed Jul 2 01:49:35.182957 kernel: audit: type=1334 audit(1719884974.538:91): prog-id=12 op=LOAD Jul 2 01:49:35.182965 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 01:49:35.182974 kernel: audit: type=1334 audit(1719884974.538:92): prog-id=3 op=UNLOAD Jul 2 01:49:35.182985 kernel: audit: type=1334 audit(1719884974.539:93): prog-id=13 op=LOAD Jul 2 01:49:35.182994 kernel: audit: type=1334 audit(1719884974.539:94): prog-id=14 op=LOAD Jul 2 01:49:35.183003 kernel: audit: type=1334 audit(1719884974.539:95): prog-id=4 op=UNLOAD Jul 2 01:49:35.183013 systemd[1]: Stopped initrd-switch-root.service. Jul 2 01:49:35.183022 kernel: audit: type=1334 audit(1719884974.539:96): prog-id=5 op=UNLOAD Jul 2 01:49:35.183031 kernel: audit: type=1334 audit(1719884974.539:97): prog-id=15 op=LOAD Jul 2 01:49:35.183039 kernel: audit: type=1334 audit(1719884974.539:98): prog-id=12 op=UNLOAD Jul 2 01:49:35.183048 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 01:49:35.183057 kernel: audit: type=1334 audit(1719884974.539:99): prog-id=16 op=LOAD Jul 2 01:49:35.183066 kernel: audit: type=1334 audit(1719884974.539:100): prog-id=17 op=LOAD Jul 2 01:49:35.183076 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 01:49:35.183087 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 01:49:35.183096 systemd[1]: Created slice system-getty.slice. Jul 2 01:49:35.183106 systemd[1]: Created slice system-modprobe.slice. Jul 2 01:49:35.183115 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 01:49:35.183125 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 01:49:35.183134 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 01:49:35.183144 systemd[1]: Created slice user.slice. Jul 2 01:49:35.183153 systemd[1]: Started systemd-ask-password-console.path. Jul 2 01:49:35.183164 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 01:49:35.183174 systemd[1]: Set up automount boot.automount. Jul 2 01:49:35.183183 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 01:49:35.183193 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 01:49:35.183202 systemd[1]: Stopped target initrd-fs.target. Jul 2 01:49:35.183212 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 01:49:35.183221 systemd[1]: Reached target integritysetup.target. Jul 2 01:49:35.183231 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 01:49:35.183241 systemd[1]: Reached target remote-fs.target. Jul 2 01:49:35.183250 systemd[1]: Reached target slices.target. Jul 2 01:49:35.183260 systemd[1]: Reached target swap.target. Jul 2 01:49:35.183269 systemd[1]: Reached target torcx.target. Jul 2 01:49:35.183278 systemd[1]: Reached target veritysetup.target. Jul 2 01:49:35.183288 systemd[1]: Listening on systemd-coredump.socket. Jul 2 01:49:35.183298 systemd[1]: Listening on systemd-initctl.socket. Jul 2 01:49:35.183307 systemd[1]: Listening on systemd-networkd.socket. Jul 2 01:49:35.183318 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 01:49:35.183328 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 01:49:35.183337 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 01:49:35.183347 systemd[1]: Mounting dev-hugepages.mount... Jul 2 01:49:35.183356 systemd[1]: Mounting dev-mqueue.mount... Jul 2 01:49:35.183367 systemd[1]: Mounting media.mount... Jul 2 01:49:35.183377 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 01:49:35.183387 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 01:49:35.183396 systemd[1]: Mounting tmp.mount... Jul 2 01:49:35.183405 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 01:49:35.183415 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:49:35.183425 systemd[1]: Starting kmod-static-nodes.service... Jul 2 01:49:35.183434 systemd[1]: Starting modprobe@configfs.service... Jul 2 01:49:35.183444 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:49:35.183471 systemd[1]: Starting modprobe@drm.service... Jul 2 01:49:35.183481 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:49:35.183490 systemd[1]: Starting modprobe@fuse.service... Jul 2 01:49:35.183500 systemd[1]: Starting modprobe@loop.service... Jul 2 01:49:35.183511 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 01:49:35.183520 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 01:49:35.183530 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 01:49:35.183539 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 01:49:35.183549 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 01:49:35.183559 systemd[1]: Stopped systemd-journald.service. Jul 2 01:49:35.183569 systemd[1]: systemd-journald.service: Consumed 2.912s CPU time. Jul 2 01:49:35.183579 systemd[1]: Starting systemd-journald.service... Jul 2 01:49:35.183607 kernel: loop: module loaded Jul 2 01:49:35.183692 systemd[1]: Starting systemd-modules-load.service... Jul 2 01:49:35.183712 kernel: fuse: init (API version 7.34) Jul 2 01:49:35.183721 systemd[1]: Starting systemd-network-generator.service... Jul 2 01:49:35.183731 systemd[1]: Starting systemd-remount-fs.service... Jul 2 01:49:35.183740 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 01:49:35.183752 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 01:49:35.183762 systemd[1]: Stopped verity-setup.service. Jul 2 01:49:35.183771 systemd[1]: Mounted dev-hugepages.mount. Jul 2 01:49:35.183780 systemd[1]: Mounted dev-mqueue.mount. Jul 2 01:49:35.183793 systemd-journald[1182]: Journal started Jul 2 01:49:35.183849 systemd-journald[1182]: Runtime Journal (/run/log/journal/383e80ec50be4ed69816c130d471b48e) is 8.0M, max 78.6M, 70.6M free. Jul 2 01:49:26.329000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 01:49:26.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:49:26.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:49:26.970000 audit: BPF prog-id=10 op=LOAD Jul 2 01:49:26.970000 audit: BPF prog-id=10 op=UNLOAD Jul 2 01:49:26.985000 audit: BPF prog-id=11 op=LOAD Jul 2 01:49:26.985000 audit: BPF prog-id=11 op=UNLOAD Jul 2 01:49:28.223000 audit[1076]: AVC avc: denied { associate } for pid=1076 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 01:49:28.223000 audit[1076]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=4000022284 a1=4000028360 a2=40000267c0 a3=32 items=0 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:49:28.223000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 01:49:28.233000 audit[1076]: AVC avc: denied { associate } for pid=1076 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 01:49:28.233000 audit[1076]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000022369 a2=1ed a3=0 items=2 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:49:28.233000 audit: CWD cwd="/" Jul 2 01:49:28.233000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:28.233000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:28.233000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 01:49:34.538000 audit: BPF prog-id=12 op=LOAD Jul 2 01:49:34.538000 audit: BPF prog-id=3 op=UNLOAD Jul 2 01:49:34.539000 audit: BPF prog-id=13 op=LOAD Jul 2 01:49:34.539000 audit: BPF prog-id=14 op=LOAD Jul 2 01:49:34.539000 audit: BPF prog-id=4 op=UNLOAD Jul 2 01:49:34.539000 audit: BPF prog-id=5 op=UNLOAD Jul 2 01:49:34.539000 audit: BPF prog-id=15 op=LOAD Jul 2 01:49:34.539000 audit: BPF prog-id=12 op=UNLOAD Jul 2 01:49:34.539000 audit: BPF prog-id=16 op=LOAD Jul 2 01:49:34.539000 audit: BPF prog-id=17 op=LOAD Jul 2 01:49:34.539000 audit: BPF prog-id=13 op=UNLOAD Jul 2 01:49:34.539000 audit: BPF prog-id=14 op=UNLOAD Jul 2 01:49:34.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:34.567000 audit: BPF prog-id=15 op=UNLOAD Jul 2 01:49:34.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:34.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.069000 audit: BPF prog-id=18 op=LOAD Jul 2 01:49:35.069000 audit: BPF prog-id=19 op=LOAD Jul 2 01:49:35.069000 audit: BPF prog-id=20 op=LOAD Jul 2 01:49:35.069000 audit: BPF prog-id=16 op=UNLOAD Jul 2 01:49:35.069000 audit: BPF prog-id=17 op=UNLOAD Jul 2 01:49:35.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.179000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 01:49:35.179000 audit[1182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=fffffa6d8550 a2=4000 a3=1 items=0 ppid=1 pid=1182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:49:35.179000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 01:49:34.538424 systemd[1]: Queued start job for default target multi-user.target. Jul 2 01:49:28.159483 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 01:49:34.541325 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 01:49:28.177851 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 01:49:34.541707 systemd[1]: systemd-journald.service: Consumed 2.912s CPU time. Jul 2 01:49:28.177870 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 01:49:28.177905 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:28Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 01:49:28.177915 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:28Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 01:49:28.177947 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:28Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 01:49:28.177959 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:28Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 01:49:28.178153 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:28Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 01:49:28.178183 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 01:49:28.178195 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 01:49:28.209406 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 01:49:28.209474 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 01:49:28.209507 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 01:49:28.209522 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 01:49:28.209543 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 01:49:28.209555 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 01:49:33.537605 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:33Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:49:33.537870 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:33Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:49:33.537973 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:33Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:49:33.538135 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:33Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:49:33.538182 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:33Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 01:49:33.538236 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-07-02T01:49:33Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 01:49:35.196287 systemd[1]: Started systemd-journald.service. Jul 2 01:49:35.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.197109 systemd[1]: Mounted media.mount. Jul 2 01:49:35.200612 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 01:49:35.204747 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 01:49:35.208785 systemd[1]: Mounted tmp.mount. Jul 2 01:49:35.212112 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 01:49:35.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.216357 systemd[1]: Finished kmod-static-nodes.service. Jul 2 01:49:35.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.221096 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 01:49:35.221227 systemd[1]: Finished modprobe@configfs.service. Jul 2 01:49:35.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.225615 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:49:35.225733 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:49:35.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.230069 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 01:49:35.230186 systemd[1]: Finished modprobe@drm.service. Jul 2 01:49:35.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.234268 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:49:35.234384 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:49:35.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.239105 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 01:49:35.239221 systemd[1]: Finished modprobe@fuse.service. Jul 2 01:49:35.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.243245 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:49:35.243360 systemd[1]: Finished modprobe@loop.service. Jul 2 01:49:35.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.247478 systemd[1]: Finished systemd-network-generator.service. Jul 2 01:49:35.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.253098 systemd[1]: Finished systemd-modules-load.service. Jul 2 01:49:35.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.257760 systemd[1]: Finished systemd-remount-fs.service. Jul 2 01:49:35.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.262255 systemd[1]: Reached target network-pre.target. Jul 2 01:49:35.267492 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 01:49:35.272562 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 01:49:35.276444 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 01:49:35.281776 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 01:49:35.287040 systemd[1]: Starting systemd-journal-flush.service... Jul 2 01:49:35.290940 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 01:49:35.291905 systemd[1]: Starting systemd-random-seed.service... Jul 2 01:49:35.295789 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 01:49:35.296715 systemd[1]: Starting systemd-sysctl.service... Jul 2 01:49:35.302112 systemd[1]: Starting systemd-sysusers.service... Jul 2 01:49:35.308075 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 01:49:35.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.312849 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 01:49:35.317307 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 01:49:35.322386 systemd[1]: Starting systemd-udev-settle.service... Jul 2 01:49:35.329380 udevadm[1196]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 2 01:49:35.380610 systemd-journald[1182]: Time spent on flushing to /var/log/journal/383e80ec50be4ed69816c130d471b48e is 13.530ms for 1094 entries. Jul 2 01:49:35.380610 systemd-journald[1182]: System Journal (/var/log/journal/383e80ec50be4ed69816c130d471b48e) is 8.0M, max 2.6G, 2.6G free. Jul 2 01:49:35.507221 systemd-journald[1182]: Received client request to flush runtime journal. Jul 2 01:49:35.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.405774 systemd[1]: Finished systemd-random-seed.service. Jul 2 01:49:35.410658 systemd[1]: Reached target first-boot-complete.target. Jul 2 01:49:35.419094 systemd[1]: Finished systemd-sysctl.service. Jul 2 01:49:35.508220 systemd[1]: Finished systemd-journal-flush.service. Jul 2 01:49:35.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.953424 systemd[1]: Finished systemd-sysusers.service. Jul 2 01:49:35.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:35.958945 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 01:49:36.320560 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 01:49:36.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:36.586757 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 01:49:36.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:36.591000 audit: BPF prog-id=21 op=LOAD Jul 2 01:49:36.591000 audit: BPF prog-id=22 op=LOAD Jul 2 01:49:36.591000 audit: BPF prog-id=7 op=UNLOAD Jul 2 01:49:36.591000 audit: BPF prog-id=8 op=UNLOAD Jul 2 01:49:36.592525 systemd[1]: Starting systemd-udevd.service... Jul 2 01:49:36.609682 systemd-udevd[1201]: Using default interface naming scheme 'v252'. Jul 2 01:49:37.098748 systemd[1]: Started systemd-udevd.service. Jul 2 01:49:37.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.113590 systemd[1]: Starting systemd-networkd.service... Jul 2 01:49:37.112000 audit: BPF prog-id=23 op=LOAD Jul 2 01:49:37.131558 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Jul 2 01:49:37.186000 audit[1212]: AVC avc: denied { confidentiality } for pid=1212 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 01:49:37.199818 kernel: hv_vmbus: registering driver hv_balloon Jul 2 01:49:37.199893 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Jul 2 01:49:37.199921 kernel: hv_balloon: Memory hot add disabled on ARM64 Jul 2 01:49:37.186000 audit[1212]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf1307560 a1=aa2c a2=ffff91d524b0 a3=aaaaf1264010 items=12 ppid=1201 pid=1212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:49:37.186000 audit: CWD cwd="/" Jul 2 01:49:37.186000 audit: PATH item=0 name=(null) inode=5945 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:37.186000 audit: PATH item=1 name=(null) inode=10722 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:37.186000 audit: PATH item=2 name=(null) inode=10722 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:37.186000 audit: PATH item=3 name=(null) inode=10723 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:37.186000 audit: PATH item=4 name=(null) inode=10722 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:37.186000 audit: PATH item=5 name=(null) inode=10724 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:37.186000 audit: PATH item=6 name=(null) inode=10722 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:37.186000 audit: PATH item=7 name=(null) inode=10725 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:37.186000 audit: PATH item=8 name=(null) inode=10722 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:37.186000 audit: PATH item=9 name=(null) inode=10726 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:37.186000 audit: PATH item=10 name=(null) inode=10722 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:37.186000 audit: PATH item=11 name=(null) inode=10727 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:37.186000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 01:49:37.219000 audit: BPF prog-id=24 op=LOAD Jul 2 01:49:37.219000 audit: BPF prog-id=25 op=LOAD Jul 2 01:49:37.219000 audit: BPF prog-id=26 op=LOAD Jul 2 01:49:37.221415 systemd[1]: Starting systemd-userdbd.service... Jul 2 01:49:37.242852 kernel: hv_vmbus: registering driver hyperv_fb Jul 2 01:49:37.242925 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 01:49:37.265058 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Jul 2 01:49:37.265190 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Jul 2 01:49:37.271698 kernel: Console: switching to colour dummy device 80x25 Jul 2 01:49:37.276839 kernel: Console: switching to colour frame buffer device 128x48 Jul 2 01:49:37.290378 kernel: hv_utils: Registering HyperV Utility Driver Jul 2 01:49:37.290476 kernel: hv_vmbus: registering driver hv_utils Jul 2 01:49:37.294957 kernel: hv_utils: Heartbeat IC version 3.0 Jul 2 01:49:37.295031 kernel: hv_utils: Shutdown IC version 3.2 Jul 2 01:49:37.300702 kernel: hv_utils: TimeSync IC version 4.0 Jul 2 01:49:37.368641 systemd[1]: Started systemd-userdbd.service. Jul 2 01:49:37.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.718868 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1220) Jul 2 01:49:37.740724 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 01:49:37.748185 systemd[1]: Finished systemd-udev-settle.service. Jul 2 01:49:37.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.753944 systemd[1]: Starting lvm2-activation-early.service... Jul 2 01:49:37.852609 systemd-networkd[1222]: lo: Link UP Jul 2 01:49:37.852905 systemd-networkd[1222]: lo: Gained carrier Jul 2 01:49:37.853373 systemd-networkd[1222]: Enumeration completed Jul 2 01:49:37.853552 systemd[1]: Started systemd-networkd.service. Jul 2 01:49:37.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.858939 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 01:49:37.881332 systemd-networkd[1222]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 01:49:37.928826 kernel: mlx5_core f461:00:02.0 enP62561s1: Link up Jul 2 01:49:37.954668 systemd-networkd[1222]: enP62561s1: Link UP Jul 2 01:49:37.954761 systemd-networkd[1222]: eth0: Link UP Jul 2 01:49:37.954907 kernel: hv_netvsc 000d3a06-9dcb-000d-3a06-9dcb000d3a06 eth0: Data path switched to VF: enP62561s1 Jul 2 01:49:37.954764 systemd-networkd[1222]: eth0: Gained carrier Jul 2 01:49:37.960032 systemd-networkd[1222]: enP62561s1: Gained carrier Jul 2 01:49:37.967940 systemd-networkd[1222]: eth0: DHCPv4 address 10.200.20.4/24, gateway 10.200.20.1 acquired from 168.63.129.16 Jul 2 01:49:38.141186 lvm[1278]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 01:49:38.179686 systemd[1]: Finished lvm2-activation-early.service. Jul 2 01:49:38.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.184791 systemd[1]: Reached target cryptsetup.target. Jul 2 01:49:38.190074 systemd[1]: Starting lvm2-activation.service... Jul 2 01:49:38.194282 lvm[1280]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 01:49:38.216681 systemd[1]: Finished lvm2-activation.service. Jul 2 01:49:38.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.221311 systemd[1]: Reached target local-fs-pre.target. Jul 2 01:49:38.225563 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 01:49:38.225594 systemd[1]: Reached target local-fs.target. Jul 2 01:49:38.229544 systemd[1]: Reached target machines.target. Jul 2 01:49:38.234743 systemd[1]: Starting ldconfig.service... Jul 2 01:49:38.252876 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:49:38.252939 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:49:38.254006 systemd[1]: Starting systemd-boot-update.service... Jul 2 01:49:38.258645 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 01:49:38.266003 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 01:49:38.271338 systemd[1]: Starting systemd-sysext.service... Jul 2 01:49:38.297548 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1282 (bootctl) Jul 2 01:49:38.298798 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 01:49:38.393048 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 01:49:38.397714 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 01:49:38.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.427665 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 01:49:38.428500 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 01:49:38.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.452279 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 01:49:38.452457 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 01:49:38.498830 kernel: loop0: detected capacity change from 0 to 193208 Jul 2 01:49:38.536832 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 01:49:38.562828 kernel: loop1: detected capacity change from 0 to 193208 Jul 2 01:49:38.571221 (sd-sysext)[1294]: Using extensions 'kubernetes'. Jul 2 01:49:38.571543 (sd-sysext)[1294]: Merged extensions into '/usr'. Jul 2 01:49:38.588584 systemd[1]: Mounting usr-share-oem.mount... Jul 2 01:49:38.592361 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:49:38.593697 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:49:38.598561 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:49:38.603549 systemd[1]: Starting modprobe@loop.service... Jul 2 01:49:38.607226 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:49:38.607474 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:49:38.609876 systemd[1]: Mounted usr-share-oem.mount. Jul 2 01:49:38.613961 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:49:38.614182 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:49:38.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.618480 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:49:38.618594 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:49:38.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.623270 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:49:38.623381 systemd[1]: Finished modprobe@loop.service. Jul 2 01:49:38.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.627570 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 01:49:38.627663 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 01:49:38.628710 systemd[1]: Finished systemd-sysext.service. Jul 2 01:49:38.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.634879 systemd[1]: Starting ensure-sysext.service... Jul 2 01:49:38.639250 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 01:49:38.650885 systemd[1]: Reloading. Jul 2 01:49:38.655504 systemd-tmpfiles[1301]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 01:49:38.661529 systemd-fsck[1290]: fsck.fat 4.2 (2021-01-31) Jul 2 01:49:38.661529 systemd-fsck[1290]: /dev/sda1: 236 files, 117047/258078 clusters Jul 2 01:49:38.685295 systemd-tmpfiles[1301]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 01:49:38.702056 systemd-tmpfiles[1301]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 01:49:38.705918 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2024-07-02T01:49:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 01:49:38.706212 /usr/lib/systemd/system-generators/torcx-generator[1324]: time="2024-07-02T01:49:38Z" level=info msg="torcx already run" Jul 2 01:49:38.783159 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 01:49:38.783175 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 01:49:38.799244 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 01:49:38.861000 audit: BPF prog-id=27 op=LOAD Jul 2 01:49:38.861000 audit: BPF prog-id=23 op=UNLOAD Jul 2 01:49:38.862000 audit: BPF prog-id=28 op=LOAD Jul 2 01:49:38.862000 audit: BPF prog-id=29 op=LOAD Jul 2 01:49:38.862000 audit: BPF prog-id=21 op=UNLOAD Jul 2 01:49:38.862000 audit: BPF prog-id=22 op=UNLOAD Jul 2 01:49:38.862000 audit: BPF prog-id=30 op=LOAD Jul 2 01:49:38.862000 audit: BPF prog-id=24 op=UNLOAD Jul 2 01:49:38.862000 audit: BPF prog-id=31 op=LOAD Jul 2 01:49:38.862000 audit: BPF prog-id=32 op=LOAD Jul 2 01:49:38.862000 audit: BPF prog-id=25 op=UNLOAD Jul 2 01:49:38.862000 audit: BPF prog-id=26 op=UNLOAD Jul 2 01:49:38.863000 audit: BPF prog-id=33 op=LOAD Jul 2 01:49:38.863000 audit: BPF prog-id=18 op=UNLOAD Jul 2 01:49:38.863000 audit: BPF prog-id=34 op=LOAD Jul 2 01:49:38.863000 audit: BPF prog-id=35 op=LOAD Jul 2 01:49:38.863000 audit: BPF prog-id=19 op=UNLOAD Jul 2 01:49:38.863000 audit: BPF prog-id=20 op=UNLOAD Jul 2 01:49:38.867536 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 01:49:38.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.877891 systemd[1]: Mounting boot.mount... Jul 2 01:49:38.884499 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:49:38.885695 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:49:38.890747 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:49:38.896258 systemd[1]: Starting modprobe@loop.service... Jul 2 01:49:38.900632 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:49:38.900759 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:49:38.902950 systemd[1]: Mounted boot.mount. Jul 2 01:49:38.906616 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:49:38.906761 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:49:38.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.912147 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:49:38.912259 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:49:38.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.917383 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:49:38.917611 systemd[1]: Finished modprobe@loop.service. Jul 2 01:49:38.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.926741 systemd[1]: Finished systemd-boot-update.service. Jul 2 01:49:38.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.932506 systemd[1]: Finished ensure-sysext.service. Jul 2 01:49:38.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.937704 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:49:38.938771 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:49:38.944036 systemd[1]: Starting modprobe@drm.service... Jul 2 01:49:38.948435 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:49:38.953758 systemd[1]: Starting modprobe@loop.service... Jul 2 01:49:38.957689 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:49:38.957748 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:49:38.958250 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:49:38.958398 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:49:38.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.962871 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 01:49:38.962994 systemd[1]: Finished modprobe@drm.service. Jul 2 01:49:38.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.967049 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:49:38.967178 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:49:38.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.972051 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:49:38.972179 systemd[1]: Finished modprobe@loop.service. Jul 2 01:49:38.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.976558 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 01:49:38.976598 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 01:49:39.203119 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 01:49:39.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:39.209271 systemd[1]: Starting audit-rules.service... Jul 2 01:49:39.214221 systemd[1]: Starting clean-ca-certificates.service... Jul 2 01:49:39.219659 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 01:49:39.224000 audit: BPF prog-id=36 op=LOAD Jul 2 01:49:39.226431 systemd[1]: Starting systemd-resolved.service... Jul 2 01:49:39.230000 audit: BPF prog-id=37 op=LOAD Jul 2 01:49:39.232355 systemd[1]: Starting systemd-timesyncd.service... Jul 2 01:49:39.237590 systemd[1]: Starting systemd-update-utmp.service... Jul 2 01:49:39.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:39.268473 systemd[1]: Finished clean-ca-certificates.service. Jul 2 01:49:39.273769 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 01:49:39.289000 audit[1399]: SYSTEM_BOOT pid=1399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 01:49:39.292270 systemd[1]: Finished systemd-update-utmp.service. Jul 2 01:49:39.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:39.314820 systemd[1]: Started systemd-timesyncd.service. Jul 2 01:49:39.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:39.319513 systemd[1]: Reached target time-set.target. Jul 2 01:49:39.401796 systemd-resolved[1396]: Positive Trust Anchors: Jul 2 01:49:39.401819 systemd-resolved[1396]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 01:49:39.401847 systemd-resolved[1396]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 01:49:39.405481 systemd-resolved[1396]: Using system hostname 'ci-3510.3.5-a-6c47a6a388'. Jul 2 01:49:39.406928 systemd[1]: Started systemd-resolved.service. Jul 2 01:49:39.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:39.411340 systemd[1]: Reached target network.target. Jul 2 01:49:39.416431 systemd[1]: Reached target nss-lookup.target. Jul 2 01:49:39.444361 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 01:49:39.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:39.619640 systemd-timesyncd[1398]: Contacted time server 71.162.136.44:123 (1.flatcar.pool.ntp.org). Jul 2 01:49:39.619734 systemd-timesyncd[1398]: Initial clock synchronization to Tue 2024-07-02 01:49:39.607505 UTC. Jul 2 01:49:39.650000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 01:49:39.655559 kernel: kauditd_printk_skb: 127 callbacks suppressed Jul 2 01:49:39.655632 kernel: audit: type=1305 audit(1719884979.650:211): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 01:49:39.650000 audit[1414]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdf5747d0 a2=420 a3=0 items=0 ppid=1393 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:49:39.687841 kernel: audit: type=1300 audit(1719884979.650:211): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdf5747d0 a2=420 a3=0 items=0 ppid=1393 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:49:39.676981 systemd-networkd[1222]: eth0: Gained IPv6LL Jul 2 01:49:39.688257 augenrules[1414]: No rules Jul 2 01:49:39.650000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 01:49:39.689143 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 01:49:39.698213 kernel: audit: type=1327 audit(1719884979.650:211): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 01:49:39.704052 systemd[1]: Finished audit-rules.service. Jul 2 01:49:39.708194 systemd[1]: Reached target network-online.target. Jul 2 01:49:46.539868 ldconfig[1281]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 01:49:46.549342 systemd[1]: Finished ldconfig.service. Jul 2 01:49:46.554980 systemd[1]: Starting systemd-update-done.service... Jul 2 01:49:46.582821 systemd[1]: Finished systemd-update-done.service. Jul 2 01:49:46.587917 systemd[1]: Reached target sysinit.target. Jul 2 01:49:46.592462 systemd[1]: Started motdgen.path. Jul 2 01:49:46.596095 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 01:49:46.603346 systemd[1]: Started logrotate.timer. Jul 2 01:49:46.607116 systemd[1]: Started mdadm.timer. Jul 2 01:49:46.610523 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 01:49:46.615216 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 01:49:46.615330 systemd[1]: Reached target paths.target. Jul 2 01:49:46.619345 systemd[1]: Reached target timers.target. Jul 2 01:49:46.623855 systemd[1]: Listening on dbus.socket. Jul 2 01:49:46.629060 systemd[1]: Starting docker.socket... Jul 2 01:49:46.649379 systemd[1]: Listening on sshd.socket. Jul 2 01:49:46.653312 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:49:46.653844 systemd[1]: Listening on docker.socket. Jul 2 01:49:46.657751 systemd[1]: Reached target sockets.target. Jul 2 01:49:46.661935 systemd[1]: Reached target basic.target. Jul 2 01:49:46.665837 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 01:49:46.665945 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 01:49:46.666970 systemd[1]: Starting containerd.service... Jul 2 01:49:46.671523 systemd[1]: Starting dbus.service... Jul 2 01:49:46.675870 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 01:49:46.681037 systemd[1]: Starting extend-filesystems.service... Jul 2 01:49:46.687655 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 01:49:46.701477 systemd[1]: Starting kubelet.service... Jul 2 01:49:46.705650 systemd[1]: Starting motdgen.service... Jul 2 01:49:46.709898 systemd[1]: Started nvidia.service. Jul 2 01:49:46.714795 systemd[1]: Starting prepare-helm.service... Jul 2 01:49:46.719233 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 01:49:46.724300 systemd[1]: Starting sshd-keygen.service... Jul 2 01:49:46.730113 systemd[1]: Starting systemd-logind.service... Jul 2 01:49:46.735516 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:49:46.735576 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 01:49:46.735983 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 01:49:46.736573 systemd[1]: Starting update-engine.service... Jul 2 01:49:46.742143 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 01:49:46.752072 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 01:49:46.752245 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 01:49:46.771687 jq[1424]: false Jul 2 01:49:46.772850 jq[1441]: true Jul 2 01:49:46.774324 extend-filesystems[1425]: Found loop1 Jul 2 01:49:46.774324 extend-filesystems[1425]: Found sda Jul 2 01:49:46.782306 extend-filesystems[1425]: Found sda1 Jul 2 01:49:46.782306 extend-filesystems[1425]: Found sda2 Jul 2 01:49:46.782306 extend-filesystems[1425]: Found sda3 Jul 2 01:49:46.782306 extend-filesystems[1425]: Found usr Jul 2 01:49:46.782306 extend-filesystems[1425]: Found sda4 Jul 2 01:49:46.782306 extend-filesystems[1425]: Found sda6 Jul 2 01:49:46.782306 extend-filesystems[1425]: Found sda7 Jul 2 01:49:46.782306 extend-filesystems[1425]: Found sda9 Jul 2 01:49:46.782306 extend-filesystems[1425]: Checking size of /dev/sda9 Jul 2 01:49:46.790224 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 01:49:46.790389 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 01:49:46.841628 jq[1448]: true Jul 2 01:49:46.856606 systemd-logind[1435]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Jul 2 01:49:46.858745 systemd-logind[1435]: New seat seat0. Jul 2 01:49:46.871682 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 01:49:46.871896 systemd[1]: Finished motdgen.service. Jul 2 01:49:46.897247 tar[1445]: linux-arm64/helm Jul 2 01:49:46.934189 extend-filesystems[1425]: Old size kept for /dev/sda9 Jul 2 01:49:46.947293 extend-filesystems[1425]: Found sr0 Jul 2 01:49:46.941858 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 01:49:46.942015 systemd[1]: Finished extend-filesystems.service. Jul 2 01:49:46.967952 env[1468]: time="2024-07-02T01:49:46.967904525Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 01:49:47.017441 env[1468]: time="2024-07-02T01:49:47.017399560Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 01:49:47.018052 env[1468]: time="2024-07-02T01:49:47.018015185Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:49:47.023171 env[1468]: time="2024-07-02T01:49:47.020015509Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 01:49:47.023171 env[1468]: time="2024-07-02T01:49:47.020046774Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:49:47.023171 env[1468]: time="2024-07-02T01:49:47.021980129Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 01:49:47.023171 env[1468]: time="2024-07-02T01:49:47.022001279Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 01:49:47.023171 env[1468]: time="2024-07-02T01:49:47.022014552Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 01:49:47.023171 env[1468]: time="2024-07-02T01:49:47.022024228Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 01:49:47.023171 env[1468]: time="2024-07-02T01:49:47.022206221Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:49:47.023171 env[1468]: time="2024-07-02T01:49:47.022414721Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:49:47.023171 env[1468]: time="2024-07-02T01:49:47.022672798Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 01:49:47.023171 env[1468]: time="2024-07-02T01:49:47.022691709Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 01:49:47.023419 env[1468]: time="2024-07-02T01:49:47.022749521Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 01:49:47.023419 env[1468]: time="2024-07-02T01:49:47.022761355Z" level=info msg="metadata content store policy set" policy=shared Jul 2 01:49:47.023462 bash[1470]: Updated "/home/core/.ssh/authorized_keys" Jul 2 01:49:47.024577 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 01:49:47.057835 env[1468]: time="2024-07-02T01:49:47.056515050Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 01:49:47.057835 env[1468]: time="2024-07-02T01:49:47.056561388Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 01:49:47.057835 env[1468]: time="2024-07-02T01:49:47.056576141Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 01:49:47.057835 env[1468]: time="2024-07-02T01:49:47.056618720Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 01:49:47.057835 env[1468]: time="2024-07-02T01:49:47.056634993Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 01:49:47.057835 env[1468]: time="2024-07-02T01:49:47.056648946Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 01:49:47.057835 env[1468]: time="2024-07-02T01:49:47.056662219Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 01:49:47.057835 env[1468]: time="2024-07-02T01:49:47.057012052Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 01:49:47.057835 env[1468]: time="2024-07-02T01:49:47.057031603Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 01:49:47.057835 env[1468]: time="2024-07-02T01:49:47.057051273Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 01:49:47.057835 env[1468]: time="2024-07-02T01:49:47.057064947Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 01:49:47.057835 env[1468]: time="2024-07-02T01:49:47.057077301Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 01:49:47.057835 env[1468]: time="2024-07-02T01:49:47.057209118Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 01:49:47.057835 env[1468]: time="2024-07-02T01:49:47.057275446Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 01:49:47.058204 env[1468]: time="2024-07-02T01:49:47.057516371Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 01:49:47.058204 env[1468]: time="2024-07-02T01:49:47.057542079Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 01:49:47.058204 env[1468]: time="2024-07-02T01:49:47.057554433Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 01:49:47.058204 env[1468]: time="2024-07-02T01:49:47.057595733Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 01:49:47.058204 env[1468]: time="2024-07-02T01:49:47.057608527Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 01:49:47.058204 env[1468]: time="2024-07-02T01:49:47.057619881Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 01:49:47.058204 env[1468]: time="2024-07-02T01:49:47.057631076Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 01:49:47.058204 env[1468]: time="2024-07-02T01:49:47.057642351Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 01:49:47.058204 env[1468]: time="2024-07-02T01:49:47.057656344Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 01:49:47.058204 env[1468]: time="2024-07-02T01:49:47.057668738Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 01:49:47.058204 env[1468]: time="2024-07-02T01:49:47.057680812Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 01:49:47.058204 env[1468]: time="2024-07-02T01:49:47.057695685Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 01:49:47.058982 env[1468]: time="2024-07-02T01:49:47.058446206Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 01:49:47.058982 env[1468]: time="2024-07-02T01:49:47.058487346Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 01:49:47.058982 env[1468]: time="2024-07-02T01:49:47.058503379Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 01:49:47.058982 env[1468]: time="2024-07-02T01:49:47.058515413Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 01:49:47.058982 env[1468]: time="2024-07-02T01:49:47.058529766Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 01:49:47.058982 env[1468]: time="2024-07-02T01:49:47.058543280Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 01:49:47.058982 env[1468]: time="2024-07-02T01:49:47.058559032Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 01:49:47.058982 env[1468]: time="2024-07-02T01:49:47.058592536Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 01:49:47.059193 env[1468]: time="2024-07-02T01:49:47.058784684Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 01:49:47.059193 env[1468]: time="2024-07-02T01:49:47.058863966Z" level=info msg="Connect containerd service" Jul 2 01:49:47.059193 env[1468]: time="2024-07-02T01:49:47.058896271Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 01:49:47.085313 env[1468]: time="2024-07-02T01:49:47.059982311Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 01:49:47.085313 env[1468]: time="2024-07-02T01:49:47.060214720Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 01:49:47.085313 env[1468]: time="2024-07-02T01:49:47.060248464Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 01:49:47.085313 env[1468]: time="2024-07-02T01:49:47.060604254Z" level=info msg="Start subscribing containerd event" Jul 2 01:49:47.085313 env[1468]: time="2024-07-02T01:49:47.060658628Z" level=info msg="Start recovering state" Jul 2 01:49:47.085313 env[1468]: time="2024-07-02T01:49:47.060733232Z" level=info msg="Start event monitor" Jul 2 01:49:47.085313 env[1468]: time="2024-07-02T01:49:47.060751743Z" level=info msg="Start snapshots syncer" Jul 2 01:49:47.085313 env[1468]: time="2024-07-02T01:49:47.060760859Z" level=info msg="Start cni network conf syncer for default" Jul 2 01:49:47.085313 env[1468]: time="2024-07-02T01:49:47.060768815Z" level=info msg="Start streaming server" Jul 2 01:49:47.085313 env[1468]: time="2024-07-02T01:49:47.081451242Z" level=info msg="containerd successfully booted in 0.118966s" Jul 2 01:49:47.060353 systemd[1]: Started containerd.service. Jul 2 01:49:47.161033 systemd[1]: nvidia.service: Deactivated successfully. Jul 2 01:49:47.184124 dbus-daemon[1423]: [system] SELinux support is enabled Jul 2 01:49:47.184287 systemd[1]: Started dbus.service. Jul 2 01:49:47.189442 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 01:49:47.189462 systemd[1]: Reached target system-config.target. Jul 2 01:49:47.196165 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 01:49:47.196183 systemd[1]: Reached target user-config.target. Jul 2 01:49:47.204599 systemd[1]: Started systemd-logind.service. Jul 2 01:49:47.208686 dbus-daemon[1423]: [system] Successfully activated service 'org.freedesktop.systemd1' Jul 2 01:49:47.431114 tar[1445]: linux-arm64/LICENSE Jul 2 01:49:47.431309 tar[1445]: linux-arm64/README.md Jul 2 01:49:47.435875 systemd[1]: Finished prepare-helm.service. Jul 2 01:49:47.478527 update_engine[1438]: I0702 01:49:47.464783 1438 main.cc:92] Flatcar Update Engine starting Jul 2 01:49:47.513925 systemd[1]: Started update-engine.service. Jul 2 01:49:47.514951 update_engine[1438]: I0702 01:49:47.513939 1438 update_check_scheduler.cc:74] Next update check in 2m58s Jul 2 01:49:47.519909 systemd[1]: Started locksmithd.service. Jul 2 01:49:47.787377 systemd[1]: Started kubelet.service. Jul 2 01:49:48.392874 kubelet[1534]: E0702 01:49:48.392783 1534 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:49:48.394955 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:49:48.395076 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:49:48.674287 sshd_keygen[1439]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 01:49:48.691122 systemd[1]: Finished sshd-keygen.service. Jul 2 01:49:48.696708 systemd[1]: Starting issuegen.service... Jul 2 01:49:48.701191 systemd[1]: Started waagent.service. Jul 2 01:49:48.705385 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 01:49:48.705530 systemd[1]: Finished issuegen.service. Jul 2 01:49:48.710643 systemd[1]: Starting systemd-user-sessions.service... Jul 2 01:49:48.763376 systemd[1]: Finished systemd-user-sessions.service. Jul 2 01:49:48.769478 systemd[1]: Started getty@tty1.service. Jul 2 01:49:48.774712 systemd[1]: Started serial-getty@ttyAMA0.service. Jul 2 01:49:48.779286 systemd[1]: Reached target getty.target. Jul 2 01:49:48.788378 systemd[1]: Reached target multi-user.target. Jul 2 01:49:48.794001 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 01:49:48.801651 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 01:49:48.801830 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 01:49:48.813119 systemd[1]: Startup finished in 701ms (kernel) + 13.253s (initrd) + 22.860s (userspace) = 36.815s. Jul 2 01:49:48.849151 locksmithd[1531]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 01:49:49.388405 login[1558]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Jul 2 01:49:49.412537 login[1557]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 01:49:49.455448 systemd[1]: Created slice user-500.slice. Jul 2 01:49:49.456505 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 01:49:49.459726 systemd-logind[1435]: New session 1 of user core. Jul 2 01:49:49.481013 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 01:49:49.482476 systemd[1]: Starting user@500.service... Jul 2 01:49:49.513785 (systemd)[1561]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:49:49.722750 systemd[1561]: Queued start job for default target default.target. Jul 2 01:49:49.723252 systemd[1561]: Reached target paths.target. Jul 2 01:49:49.723272 systemd[1561]: Reached target sockets.target. Jul 2 01:49:49.723283 systemd[1561]: Reached target timers.target. Jul 2 01:49:49.723292 systemd[1561]: Reached target basic.target. Jul 2 01:49:49.723347 systemd[1561]: Reached target default.target. Jul 2 01:49:49.723370 systemd[1561]: Startup finished in 203ms. Jul 2 01:49:49.723418 systemd[1]: Started user@500.service. Jul 2 01:49:49.724354 systemd[1]: Started session-1.scope. Jul 2 01:49:50.390243 login[1558]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 01:49:50.394003 systemd-logind[1435]: New session 2 of user core. Jul 2 01:49:50.394384 systemd[1]: Started session-2.scope. Jul 2 01:49:54.830410 waagent[1554]: 2024-07-02T01:49:54.830309Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Jul 2 01:49:54.837416 waagent[1554]: 2024-07-02T01:49:54.837354Z INFO Daemon Daemon OS: flatcar 3510.3.5 Jul 2 01:49:54.842043 waagent[1554]: 2024-07-02T01:49:54.841987Z INFO Daemon Daemon Python: 3.9.16 Jul 2 01:49:54.846556 waagent[1554]: 2024-07-02T01:49:54.846493Z INFO Daemon Daemon Run daemon Jul 2 01:49:54.851103 waagent[1554]: 2024-07-02T01:49:54.851044Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.5' Jul 2 01:49:54.869113 waagent[1554]: 2024-07-02T01:49:54.869005Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Jul 2 01:49:54.883405 waagent[1554]: 2024-07-02T01:49:54.883294Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Jul 2 01:49:54.892986 waagent[1554]: 2024-07-02T01:49:54.892921Z INFO Daemon Daemon cloud-init is enabled: False Jul 2 01:49:54.897901 waagent[1554]: 2024-07-02T01:49:54.897842Z INFO Daemon Daemon Using waagent for provisioning Jul 2 01:49:54.904033 waagent[1554]: 2024-07-02T01:49:54.903976Z INFO Daemon Daemon Activate resource disk Jul 2 01:49:54.908639 waagent[1554]: 2024-07-02T01:49:54.908582Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Jul 2 01:49:54.923099 waagent[1554]: 2024-07-02T01:49:54.923023Z INFO Daemon Daemon Found device: None Jul 2 01:49:54.927530 waagent[1554]: 2024-07-02T01:49:54.927462Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Jul 2 01:49:54.936569 waagent[1554]: 2024-07-02T01:49:54.936500Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Jul 2 01:49:54.949946 waagent[1554]: 2024-07-02T01:49:54.949883Z INFO Daemon Daemon Clean protocol and wireserver endpoint Jul 2 01:49:54.956744 waagent[1554]: 2024-07-02T01:49:54.956686Z INFO Daemon Daemon Running default provisioning handler Jul 2 01:49:54.970306 waagent[1554]: 2024-07-02T01:49:54.970192Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Jul 2 01:49:54.985743 waagent[1554]: 2024-07-02T01:49:54.985626Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Jul 2 01:49:54.996902 waagent[1554]: 2024-07-02T01:49:54.996835Z INFO Daemon Daemon cloud-init is enabled: False Jul 2 01:49:55.002609 waagent[1554]: 2024-07-02T01:49:55.002548Z INFO Daemon Daemon Copying ovf-env.xml Jul 2 01:49:55.068024 waagent[1554]: 2024-07-02T01:49:55.067088Z INFO Daemon Daemon Successfully mounted dvd Jul 2 01:49:55.137405 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Jul 2 01:49:55.174400 waagent[1554]: 2024-07-02T01:49:55.174256Z INFO Daemon Daemon Detect protocol endpoint Jul 2 01:49:55.179192 waagent[1554]: 2024-07-02T01:49:55.179127Z INFO Daemon Daemon Clean protocol and wireserver endpoint Jul 2 01:49:55.184887 waagent[1554]: 2024-07-02T01:49:55.184828Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Jul 2 01:49:55.191581 waagent[1554]: 2024-07-02T01:49:55.191524Z INFO Daemon Daemon Test for route to 168.63.129.16 Jul 2 01:49:55.196798 waagent[1554]: 2024-07-02T01:49:55.196741Z INFO Daemon Daemon Route to 168.63.129.16 exists Jul 2 01:49:55.202273 waagent[1554]: 2024-07-02T01:49:55.202215Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Jul 2 01:49:55.327481 waagent[1554]: 2024-07-02T01:49:55.327416Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Jul 2 01:49:55.334171 waagent[1554]: 2024-07-02T01:49:55.334129Z INFO Daemon Daemon Wire protocol version:2012-11-30 Jul 2 01:49:55.339856 waagent[1554]: 2024-07-02T01:49:55.339792Z INFO Daemon Daemon Server preferred version:2015-04-05 Jul 2 01:49:55.929000 waagent[1554]: 2024-07-02T01:49:55.928837Z INFO Daemon Daemon Initializing goal state during protocol detection Jul 2 01:49:55.943561 waagent[1554]: 2024-07-02T01:49:55.943493Z INFO Daemon Daemon Forcing an update of the goal state.. Jul 2 01:49:55.948972 waagent[1554]: 2024-07-02T01:49:55.948913Z INFO Daemon Daemon Fetching goal state [incarnation 1] Jul 2 01:49:56.021213 waagent[1554]: 2024-07-02T01:49:56.021083Z INFO Daemon Daemon Found private key matching thumbprint 7BB49B77886E69ECFE71A87ABD537418BE933108 Jul 2 01:49:56.029262 waagent[1554]: 2024-07-02T01:49:56.029196Z INFO Daemon Daemon Certificate with thumbprint 9D146C54DABB735A36F0B1A0AA773212C5F1DD0C has no matching private key. Jul 2 01:49:56.038773 waagent[1554]: 2024-07-02T01:49:56.038710Z INFO Daemon Daemon Fetch goal state completed Jul 2 01:49:56.056965 waagent[1554]: 2024-07-02T01:49:56.056915Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 2412dfe8-6b5c-4808-9071-b505866cc10e New eTag: 17216491583517184235] Jul 2 01:49:56.067190 waagent[1554]: 2024-07-02T01:49:56.067125Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Jul 2 01:49:56.081709 waagent[1554]: 2024-07-02T01:49:56.081632Z INFO Daemon Daemon Starting provisioning Jul 2 01:49:56.086789 waagent[1554]: 2024-07-02T01:49:56.086730Z INFO Daemon Daemon Handle ovf-env.xml. Jul 2 01:49:56.091298 waagent[1554]: 2024-07-02T01:49:56.091243Z INFO Daemon Daemon Set hostname [ci-3510.3.5-a-6c47a6a388] Jul 2 01:49:56.153599 waagent[1554]: 2024-07-02T01:49:56.153445Z INFO Daemon Daemon Publish hostname [ci-3510.3.5-a-6c47a6a388] Jul 2 01:49:56.159687 waagent[1554]: 2024-07-02T01:49:56.159613Z INFO Daemon Daemon Examine /proc/net/route for primary interface Jul 2 01:49:56.165837 waagent[1554]: 2024-07-02T01:49:56.165764Z INFO Daemon Daemon Primary interface is [eth0] Jul 2 01:49:56.181577 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Jul 2 01:49:56.181742 systemd[1]: Stopped systemd-networkd-wait-online.service. Jul 2 01:49:56.181814 systemd[1]: Stopping systemd-networkd-wait-online.service... Jul 2 01:49:56.182050 systemd[1]: Stopping systemd-networkd.service... Jul 2 01:49:56.186858 systemd-networkd[1222]: eth0: DHCPv6 lease lost Jul 2 01:49:56.188378 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 01:49:56.188555 systemd[1]: Stopped systemd-networkd.service. Jul 2 01:49:56.190596 systemd[1]: Starting systemd-networkd.service... Jul 2 01:49:56.218681 systemd-networkd[1605]: enP62561s1: Link UP Jul 2 01:49:56.218974 systemd-networkd[1605]: enP62561s1: Gained carrier Jul 2 01:49:56.220120 systemd-networkd[1605]: eth0: Link UP Jul 2 01:49:56.220189 systemd-networkd[1605]: eth0: Gained carrier Jul 2 01:49:56.220568 systemd-networkd[1605]: lo: Link UP Jul 2 01:49:56.220632 systemd-networkd[1605]: lo: Gained carrier Jul 2 01:49:56.220951 systemd-networkd[1605]: eth0: Gained IPv6LL Jul 2 01:49:56.222011 systemd-networkd[1605]: Enumeration completed Jul 2 01:49:56.222184 systemd[1]: Started systemd-networkd.service. Jul 2 01:49:56.223770 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 01:49:56.225199 systemd-networkd[1605]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 01:49:56.230693 waagent[1554]: 2024-07-02T01:49:56.230544Z INFO Daemon Daemon Create user account if not exists Jul 2 01:49:56.236055 waagent[1554]: 2024-07-02T01:49:56.235985Z INFO Daemon Daemon User core already exists, skip useradd Jul 2 01:49:56.241322 waagent[1554]: 2024-07-02T01:49:56.241263Z INFO Daemon Daemon Configure sudoer Jul 2 01:49:56.246740 waagent[1554]: 2024-07-02T01:49:56.246677Z INFO Daemon Daemon Configure sshd Jul 2 01:49:56.247886 systemd-networkd[1605]: eth0: DHCPv4 address 10.200.20.4/24, gateway 10.200.20.1 acquired from 168.63.129.16 Jul 2 01:49:56.251878 waagent[1554]: 2024-07-02T01:49:56.251515Z INFO Daemon Daemon Deploy ssh public key. Jul 2 01:49:56.251593 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 01:49:57.518046 waagent[1554]: 2024-07-02T01:49:57.517970Z INFO Daemon Daemon Provisioning complete Jul 2 01:49:57.538636 waagent[1554]: 2024-07-02T01:49:57.538571Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Jul 2 01:49:57.544513 waagent[1554]: 2024-07-02T01:49:57.544452Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Jul 2 01:49:57.554414 waagent[1554]: 2024-07-02T01:49:57.554352Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Jul 2 01:49:57.847945 waagent[1614]: 2024-07-02T01:49:57.847853Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Jul 2 01:49:57.849021 waagent[1614]: 2024-07-02T01:49:57.848967Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:49:57.849257 waagent[1614]: 2024-07-02T01:49:57.849208Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:49:57.861322 waagent[1614]: 2024-07-02T01:49:57.861256Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Jul 2 01:49:57.861584 waagent[1614]: 2024-07-02T01:49:57.861534Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Jul 2 01:49:57.931774 waagent[1614]: 2024-07-02T01:49:57.931648Z INFO ExtHandler ExtHandler Found private key matching thumbprint 7BB49B77886E69ECFE71A87ABD537418BE933108 Jul 2 01:49:57.932162 waagent[1614]: 2024-07-02T01:49:57.932108Z INFO ExtHandler ExtHandler Certificate with thumbprint 9D146C54DABB735A36F0B1A0AA773212C5F1DD0C has no matching private key. Jul 2 01:49:57.932474 waagent[1614]: 2024-07-02T01:49:57.932424Z INFO ExtHandler ExtHandler Fetch goal state completed Jul 2 01:49:57.946054 waagent[1614]: 2024-07-02T01:49:57.946003Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 176f3d2b-697b-4134-8b0e-a25b553d5604 New eTag: 17216491583517184235] Jul 2 01:49:57.946721 waagent[1614]: 2024-07-02T01:49:57.946662Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Jul 2 01:49:58.021722 waagent[1614]: 2024-07-02T01:49:58.021595Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.5; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Jul 2 01:49:58.046716 waagent[1614]: 2024-07-02T01:49:58.046645Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1614 Jul 2 01:49:58.050538 waagent[1614]: 2024-07-02T01:49:58.050479Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.5', '', 'Flatcar Container Linux by Kinvolk'] Jul 2 01:49:58.051971 waagent[1614]: 2024-07-02T01:49:58.051914Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Jul 2 01:49:58.195537 waagent[1614]: 2024-07-02T01:49:58.195428Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Jul 2 01:49:58.196100 waagent[1614]: 2024-07-02T01:49:58.196043Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Jul 2 01:49:58.203961 waagent[1614]: 2024-07-02T01:49:58.203904Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Jul 2 01:49:58.204597 waagent[1614]: 2024-07-02T01:49:58.204543Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Jul 2 01:49:58.205874 waagent[1614]: 2024-07-02T01:49:58.205790Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Jul 2 01:49:58.207317 waagent[1614]: 2024-07-02T01:49:58.207249Z INFO ExtHandler ExtHandler Starting env monitor service. Jul 2 01:49:58.207594 waagent[1614]: 2024-07-02T01:49:58.207524Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:49:58.208148 waagent[1614]: 2024-07-02T01:49:58.208075Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:49:58.208725 waagent[1614]: 2024-07-02T01:49:58.208658Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Jul 2 01:49:58.209367 waagent[1614]: 2024-07-02T01:49:58.209295Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Jul 2 01:49:58.209545 waagent[1614]: 2024-07-02T01:49:58.209480Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Jul 2 01:49:58.209545 waagent[1614]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Jul 2 01:49:58.209545 waagent[1614]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Jul 2 01:49:58.209545 waagent[1614]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Jul 2 01:49:58.209545 waagent[1614]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:49:58.209545 waagent[1614]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:49:58.209545 waagent[1614]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:49:58.209894 waagent[1614]: 2024-07-02T01:49:58.209825Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:49:58.211614 waagent[1614]: 2024-07-02T01:49:58.210579Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Jul 2 01:49:58.212396 waagent[1614]: 2024-07-02T01:49:58.212242Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:49:58.213568 waagent[1614]: 2024-07-02T01:49:58.213495Z INFO EnvHandler ExtHandler Configure routes Jul 2 01:49:58.213783 waagent[1614]: 2024-07-02T01:49:58.213719Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Jul 2 01:49:58.214482 waagent[1614]: 2024-07-02T01:49:58.214409Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Jul 2 01:49:58.214697 waagent[1614]: 2024-07-02T01:49:58.214619Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Jul 2 01:49:58.214993 waagent[1614]: 2024-07-02T01:49:58.214925Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Jul 2 01:49:58.215363 waagent[1614]: 2024-07-02T01:49:58.215294Z INFO EnvHandler ExtHandler Gateway:None Jul 2 01:49:58.218087 waagent[1614]: 2024-07-02T01:49:58.218020Z INFO EnvHandler ExtHandler Routes:None Jul 2 01:49:58.227656 waagent[1614]: 2024-07-02T01:49:58.227591Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Jul 2 01:49:58.229098 waagent[1614]: 2024-07-02T01:49:58.229033Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Jul 2 01:49:58.230097 waagent[1614]: 2024-07-02T01:49:58.230042Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Jul 2 01:49:58.274482 waagent[1614]: 2024-07-02T01:49:58.274410Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Jul 2 01:49:58.274752 waagent[1614]: 2024-07-02T01:49:58.274683Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1605' Jul 2 01:49:58.365943 waagent[1614]: 2024-07-02T01:49:58.365781Z INFO MonitorHandler ExtHandler Network interfaces: Jul 2 01:49:58.365943 waagent[1614]: Executing ['ip', '-a', '-o', 'link']: Jul 2 01:49:58.365943 waagent[1614]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Jul 2 01:49:58.365943 waagent[1614]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:9d:cb brd ff:ff:ff:ff:ff:ff Jul 2 01:49:58.365943 waagent[1614]: 3: enP62561s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:9d:cb brd ff:ff:ff:ff:ff:ff\ altname enP62561p0s2 Jul 2 01:49:58.365943 waagent[1614]: Executing ['ip', '-4', '-a', '-o', 'address']: Jul 2 01:49:58.365943 waagent[1614]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Jul 2 01:49:58.365943 waagent[1614]: 2: eth0 inet 10.200.20.4/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Jul 2 01:49:58.365943 waagent[1614]: Executing ['ip', '-6', '-a', '-o', 'address']: Jul 2 01:49:58.365943 waagent[1614]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Jul 2 01:49:58.365943 waagent[1614]: 2: eth0 inet6 fe80::20d:3aff:fe06:9dcb/64 scope link \ valid_lft forever preferred_lft forever Jul 2 01:49:58.487771 waagent[1614]: 2024-07-02T01:49:58.487658Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.11.1.4 -- exiting Jul 2 01:49:58.553385 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 01:49:58.553549 systemd[1]: Stopped kubelet.service. Jul 2 01:49:58.554852 systemd[1]: Starting kubelet.service... Jul 2 01:49:58.557235 waagent[1554]: 2024-07-02T01:49:58.557125Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Jul 2 01:49:58.562239 waagent[1554]: 2024-07-02T01:49:58.562173Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.11.1.4 to be the latest agent Jul 2 01:49:58.660373 systemd[1]: Started kubelet.service. Jul 2 01:49:59.032394 kubelet[1648]: E0702 01:49:59.032353 1648 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:49:59.035612 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:49:59.035732 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:50:00.002828 waagent[1645]: 2024-07-02T01:50:00.002723Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.11.1.4) Jul 2 01:50:00.003532 waagent[1645]: 2024-07-02T01:50:00.003463Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.5 Jul 2 01:50:00.003657 waagent[1645]: 2024-07-02T01:50:00.003612Z INFO ExtHandler ExtHandler Python: 3.9.16 Jul 2 01:50:00.003779 waagent[1645]: 2024-07-02T01:50:00.003736Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Jul 2 01:50:00.011785 waagent[1645]: 2024-07-02T01:50:00.011666Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.5; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Jul 2 01:50:00.012195 waagent[1645]: 2024-07-02T01:50:00.012136Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:50:00.012340 waagent[1645]: 2024-07-02T01:50:00.012294Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:50:00.032538 waagent[1645]: 2024-07-02T01:50:00.032471Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Jul 2 01:50:00.041245 waagent[1645]: 2024-07-02T01:50:00.041192Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.151 Jul 2 01:50:00.042231 waagent[1645]: 2024-07-02T01:50:00.042172Z INFO ExtHandler Jul 2 01:50:00.042376 waagent[1645]: 2024-07-02T01:50:00.042329Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 9e75631b-cb5f-4906-a266-81b21f8d2d8c eTag: 17216491583517184235 source: Fabric] Jul 2 01:50:00.043109 waagent[1645]: 2024-07-02T01:50:00.043052Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Jul 2 01:50:00.044326 waagent[1645]: 2024-07-02T01:50:00.044266Z INFO ExtHandler Jul 2 01:50:00.044456 waagent[1645]: 2024-07-02T01:50:00.044411Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Jul 2 01:50:00.050943 waagent[1645]: 2024-07-02T01:50:00.050895Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Jul 2 01:50:00.051380 waagent[1645]: 2024-07-02T01:50:00.051330Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Jul 2 01:50:00.070624 waagent[1645]: 2024-07-02T01:50:00.070559Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Jul 2 01:50:00.141919 waagent[1645]: 2024-07-02T01:50:00.141772Z INFO ExtHandler Downloaded certificate {'thumbprint': '9D146C54DABB735A36F0B1A0AA773212C5F1DD0C', 'hasPrivateKey': False} Jul 2 01:50:00.142976 waagent[1645]: 2024-07-02T01:50:00.142912Z INFO ExtHandler Downloaded certificate {'thumbprint': '7BB49B77886E69ECFE71A87ABD537418BE933108', 'hasPrivateKey': True} Jul 2 01:50:00.144021 waagent[1645]: 2024-07-02T01:50:00.143961Z INFO ExtHandler Fetch goal state completed Jul 2 01:50:00.166277 waagent[1645]: 2024-07-02T01:50:00.166175Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.7 1 Nov 2022 (Library: OpenSSL 3.0.7 1 Nov 2022) Jul 2 01:50:00.177961 waagent[1645]: 2024-07-02T01:50:00.177880Z INFO ExtHandler ExtHandler WALinuxAgent-2.11.1.4 running as process 1645 Jul 2 01:50:00.181472 waagent[1645]: 2024-07-02T01:50:00.181407Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.5', '', 'Flatcar Container Linux by Kinvolk'] Jul 2 01:50:00.182971 waagent[1645]: 2024-07-02T01:50:00.182912Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Jul 2 01:50:00.187581 waagent[1645]: 2024-07-02T01:50:00.187518Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Jul 2 01:50:00.187987 waagent[1645]: 2024-07-02T01:50:00.187930Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Jul 2 01:50:00.195721 waagent[1645]: 2024-07-02T01:50:00.195660Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Jul 2 01:50:00.196201 waagent[1645]: 2024-07-02T01:50:00.196145Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Jul 2 01:50:00.201879 waagent[1645]: 2024-07-02T01:50:00.201763Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Jul 2 01:50:00.202919 waagent[1645]: 2024-07-02T01:50:00.202855Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Jul 2 01:50:00.204440 waagent[1645]: 2024-07-02T01:50:00.204369Z INFO ExtHandler ExtHandler Starting env monitor service. Jul 2 01:50:00.205102 waagent[1645]: 2024-07-02T01:50:00.205042Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:50:00.205355 waagent[1645]: 2024-07-02T01:50:00.205307Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:50:00.206059 waagent[1645]: 2024-07-02T01:50:00.205996Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Jul 2 01:50:00.206725 waagent[1645]: 2024-07-02T01:50:00.206653Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Jul 2 01:50:00.207319 waagent[1645]: 2024-07-02T01:50:00.207251Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:50:00.207541 waagent[1645]: 2024-07-02T01:50:00.207459Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Jul 2 01:50:00.207780 waagent[1645]: 2024-07-02T01:50:00.207710Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Jul 2 01:50:00.208086 waagent[1645]: 2024-07-02T01:50:00.208022Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:50:00.208342 waagent[1645]: 2024-07-02T01:50:00.208277Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Jul 2 01:50:00.208342 waagent[1645]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Jul 2 01:50:00.208342 waagent[1645]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Jul 2 01:50:00.208342 waagent[1645]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Jul 2 01:50:00.208342 waagent[1645]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:50:00.208342 waagent[1645]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:50:00.208342 waagent[1645]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:50:00.208750 waagent[1645]: 2024-07-02T01:50:00.208673Z INFO EnvHandler ExtHandler Configure routes Jul 2 01:50:00.209004 waagent[1645]: 2024-07-02T01:50:00.208940Z INFO EnvHandler ExtHandler Gateway:None Jul 2 01:50:00.209267 waagent[1645]: 2024-07-02T01:50:00.209210Z INFO EnvHandler ExtHandler Routes:None Jul 2 01:50:00.212549 waagent[1645]: 2024-07-02T01:50:00.212428Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Jul 2 01:50:00.213835 waagent[1645]: 2024-07-02T01:50:00.213744Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Jul 2 01:50:00.215470 waagent[1645]: 2024-07-02T01:50:00.215270Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Jul 2 01:50:00.231147 waagent[1645]: 2024-07-02T01:50:00.231060Z INFO ExtHandler ExtHandler Downloading agent manifest Jul 2 01:50:00.232588 waagent[1645]: 2024-07-02T01:50:00.232526Z INFO MonitorHandler ExtHandler Network interfaces: Jul 2 01:50:00.232588 waagent[1645]: Executing ['ip', '-a', '-o', 'link']: Jul 2 01:50:00.232588 waagent[1645]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Jul 2 01:50:00.232588 waagent[1645]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:9d:cb brd ff:ff:ff:ff:ff:ff Jul 2 01:50:00.232588 waagent[1645]: 3: enP62561s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:9d:cb brd ff:ff:ff:ff:ff:ff\ altname enP62561p0s2 Jul 2 01:50:00.232588 waagent[1645]: Executing ['ip', '-4', '-a', '-o', 'address']: Jul 2 01:50:00.232588 waagent[1645]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Jul 2 01:50:00.232588 waagent[1645]: 2: eth0 inet 10.200.20.4/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Jul 2 01:50:00.232588 waagent[1645]: Executing ['ip', '-6', '-a', '-o', 'address']: Jul 2 01:50:00.232588 waagent[1645]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Jul 2 01:50:00.232588 waagent[1645]: 2: eth0 inet6 fe80::20d:3aff:fe06:9dcb/64 scope link \ valid_lft forever preferred_lft forever Jul 2 01:50:00.267688 waagent[1645]: 2024-07-02T01:50:00.267575Z INFO ExtHandler ExtHandler Jul 2 01:50:00.267828 waagent[1645]: 2024-07-02T01:50:00.267759Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 9bc4ff68-756b-4d6c-a30e-7aea2ef49a7c correlation fb2b84da-510f-4c5a-9b8f-335edc6e1516 created: 2024-07-02T01:48:28.269989Z] Jul 2 01:50:00.268748 waagent[1645]: 2024-07-02T01:50:00.268681Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Jul 2 01:50:00.270616 waagent[1645]: 2024-07-02T01:50:00.270558Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 2 ms] Jul 2 01:50:00.289795 waagent[1645]: 2024-07-02T01:50:00.289737Z INFO ExtHandler ExtHandler Looking for existing remote access users. Jul 2 01:50:00.316901 waagent[1645]: 2024-07-02T01:50:00.316831Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.11.1.4 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 9CB0AFA0-16E7-4449-8FD1-828614576867;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Jul 2 01:50:00.615882 waagent[1645]: 2024-07-02T01:50:00.615738Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Jul 2 01:50:00.615882 waagent[1645]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:50:00.615882 waagent[1645]: pkts bytes target prot opt in out source destination Jul 2 01:50:00.615882 waagent[1645]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:50:00.615882 waagent[1645]: pkts bytes target prot opt in out source destination Jul 2 01:50:00.615882 waagent[1645]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:50:00.615882 waagent[1645]: pkts bytes target prot opt in out source destination Jul 2 01:50:00.615882 waagent[1645]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Jul 2 01:50:00.615882 waagent[1645]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Jul 2 01:50:00.615882 waagent[1645]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Jul 2 01:50:00.623332 waagent[1645]: 2024-07-02T01:50:00.623233Z INFO EnvHandler ExtHandler Current Firewall rules: Jul 2 01:50:00.623332 waagent[1645]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:50:00.623332 waagent[1645]: pkts bytes target prot opt in out source destination Jul 2 01:50:00.623332 waagent[1645]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:50:00.623332 waagent[1645]: pkts bytes target prot opt in out source destination Jul 2 01:50:00.623332 waagent[1645]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:50:00.623332 waagent[1645]: pkts bytes target prot opt in out source destination Jul 2 01:50:00.623332 waagent[1645]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Jul 2 01:50:00.623332 waagent[1645]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Jul 2 01:50:00.623332 waagent[1645]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Jul 2 01:50:00.624106 waagent[1645]: 2024-07-02T01:50:00.624058Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Jul 2 01:50:09.053409 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 01:50:09.053576 systemd[1]: Stopped kubelet.service. Jul 2 01:50:09.054905 systemd[1]: Starting kubelet.service... Jul 2 01:50:09.347361 systemd[1]: Started kubelet.service. Jul 2 01:50:09.388181 kubelet[1711]: E0702 01:50:09.388123 1711 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:50:09.390710 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:50:09.390851 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:50:19.553463 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Jul 2 01:50:19.553619 systemd[1]: Stopped kubelet.service. Jul 2 01:50:19.554992 systemd[1]: Starting kubelet.service... Jul 2 01:50:19.841546 systemd[1]: Started kubelet.service. Jul 2 01:50:19.882260 kubelet[1721]: E0702 01:50:19.882193 1721 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:50:19.884550 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:50:19.884668 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:50:25.360820 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Jul 2 01:50:30.053423 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Jul 2 01:50:30.053591 systemd[1]: Stopped kubelet.service. Jul 2 01:50:30.055017 systemd[1]: Starting kubelet.service... Jul 2 01:50:30.229783 systemd[1]: Started kubelet.service. Jul 2 01:50:30.270828 kubelet[1732]: E0702 01:50:30.270761 1732 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:50:30.273466 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:50:30.273595 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:50:33.013287 update_engine[1438]: I0702 01:50:33.012861 1438 update_attempter.cc:509] Updating boot flags... Jul 2 01:50:35.266400 systemd[1]: Created slice system-sshd.slice. Jul 2 01:50:35.267920 systemd[1]: Started sshd@0-10.200.20.4:22-10.200.16.10:51530.service. Jul 2 01:50:35.941555 sshd[1806]: Accepted publickey for core from 10.200.16.10 port 51530 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:50:35.958091 sshd[1806]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:50:35.961988 systemd-logind[1435]: New session 3 of user core. Jul 2 01:50:35.962405 systemd[1]: Started session-3.scope. Jul 2 01:50:36.370437 systemd[1]: Started sshd@1-10.200.20.4:22-10.200.16.10:51534.service. Jul 2 01:50:36.850055 sshd[1811]: Accepted publickey for core from 10.200.16.10 port 51534 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:50:36.851350 sshd[1811]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:50:36.855607 systemd[1]: Started session-4.scope. Jul 2 01:50:36.856594 systemd-logind[1435]: New session 4 of user core. Jul 2 01:50:37.205632 sshd[1811]: pam_unix(sshd:session): session closed for user core Jul 2 01:50:37.208358 systemd[1]: sshd@1-10.200.20.4:22-10.200.16.10:51534.service: Deactivated successfully. Jul 2 01:50:37.209056 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 01:50:37.209583 systemd-logind[1435]: Session 4 logged out. Waiting for processes to exit. Jul 2 01:50:37.210355 systemd-logind[1435]: Removed session 4. Jul 2 01:50:37.279377 systemd[1]: Started sshd@2-10.200.20.4:22-10.200.16.10:51540.service. Jul 2 01:50:37.727552 sshd[1817]: Accepted publickey for core from 10.200.16.10 port 51540 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:50:37.729177 sshd[1817]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:50:37.735067 systemd-logind[1435]: New session 5 of user core. Jul 2 01:50:37.736080 systemd[1]: Started session-5.scope. Jul 2 01:50:38.046063 sshd[1817]: pam_unix(sshd:session): session closed for user core Jul 2 01:50:38.048689 systemd[1]: sshd@2-10.200.20.4:22-10.200.16.10:51540.service: Deactivated successfully. Jul 2 01:50:38.049401 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 01:50:38.049956 systemd-logind[1435]: Session 5 logged out. Waiting for processes to exit. Jul 2 01:50:38.050801 systemd-logind[1435]: Removed session 5. Jul 2 01:50:38.125243 systemd[1]: Started sshd@3-10.200.20.4:22-10.200.16.10:51544.service. Jul 2 01:50:38.608589 sshd[1826]: Accepted publickey for core from 10.200.16.10 port 51544 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:50:38.610240 sshd[1826]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:50:38.613854 systemd-logind[1435]: New session 6 of user core. Jul 2 01:50:38.614329 systemd[1]: Started session-6.scope. Jul 2 01:50:38.966204 sshd[1826]: pam_unix(sshd:session): session closed for user core Jul 2 01:50:38.968799 systemd[1]: sshd@3-10.200.20.4:22-10.200.16.10:51544.service: Deactivated successfully. Jul 2 01:50:38.969484 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 01:50:38.970022 systemd-logind[1435]: Session 6 logged out. Waiting for processes to exit. Jul 2 01:50:38.970860 systemd-logind[1435]: Removed session 6. Jul 2 01:50:39.039734 systemd[1]: Started sshd@4-10.200.20.4:22-10.200.16.10:48904.service. Jul 2 01:50:39.488443 sshd[1832]: Accepted publickey for core from 10.200.16.10 port 48904 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:50:39.489722 sshd[1832]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:50:39.493511 systemd-logind[1435]: New session 7 of user core. Jul 2 01:50:39.493999 systemd[1]: Started session-7.scope. Jul 2 01:50:39.963625 sudo[1835]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 01:50:39.963863 sudo[1835]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:50:40.032062 dbus-daemon[1423]: avc: received setenforce notice (enforcing=1) Jul 2 01:50:40.033936 sudo[1835]: pam_unix(sudo:session): session closed for user root Jul 2 01:50:40.125238 sshd[1832]: pam_unix(sshd:session): session closed for user core Jul 2 01:50:40.128342 systemd[1]: sshd@4-10.200.20.4:22-10.200.16.10:48904.service: Deactivated successfully. Jul 2 01:50:40.129134 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 01:50:40.129709 systemd-logind[1435]: Session 7 logged out. Waiting for processes to exit. Jul 2 01:50:40.130579 systemd-logind[1435]: Removed session 7. Jul 2 01:50:40.201559 systemd[1]: Started sshd@5-10.200.20.4:22-10.200.16.10:48908.service. Jul 2 01:50:40.303508 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Jul 2 01:50:40.303667 systemd[1]: Stopped kubelet.service. Jul 2 01:50:40.305140 systemd[1]: Starting kubelet.service... Jul 2 01:50:40.656293 sshd[1839]: Accepted publickey for core from 10.200.16.10 port 48908 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:50:40.658163 sshd[1839]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:50:40.662286 systemd[1]: Started session-8.scope. Jul 2 01:50:40.662762 systemd-logind[1435]: New session 8 of user core. Jul 2 01:50:40.714851 systemd[1]: Started kubelet.service. Jul 2 01:50:40.759134 kubelet[1846]: E0702 01:50:40.759052 1846 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:50:40.761427 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:50:40.761563 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:50:40.912780 sudo[1853]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 01:50:40.913426 sudo[1853]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:50:40.916474 sudo[1853]: pam_unix(sudo:session): session closed for user root Jul 2 01:50:40.921575 sudo[1852]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 01:50:40.921829 sudo[1852]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:50:40.930652 systemd[1]: Stopping audit-rules.service... Jul 2 01:50:40.930000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 01:50:40.941737 auditctl[1856]: No rules Jul 2 01:50:40.930000 audit[1856]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc26be720 a2=420 a3=0 items=0 ppid=1 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:40.963874 kernel: audit: type=1305 audit(1719885040.930:212): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 01:50:40.963976 kernel: audit: type=1300 audit(1719885040.930:212): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc26be720 a2=420 a3=0 items=0 ppid=1 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:40.942453 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 01:50:40.942649 systemd[1]: Stopped audit-rules.service. Jul 2 01:50:40.963545 systemd[1]: Starting audit-rules.service... Jul 2 01:50:40.930000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 01:50:40.972769 kernel: audit: type=1327 audit(1719885040.930:212): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 01:50:40.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:40.989949 kernel: audit: type=1131 audit(1719885040.941:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:40.999069 augenrules[1873]: No rules Jul 2 01:50:41.000078 systemd[1]: Finished audit-rules.service. Jul 2 01:50:40.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:41.001293 sudo[1852]: pam_unix(sudo:session): session closed for user root Jul 2 01:50:41.000000 audit[1852]: USER_END pid=1852 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:50:41.033573 kernel: audit: type=1130 audit(1719885040.999:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:41.033657 kernel: audit: type=1106 audit(1719885041.000:215): pid=1852 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:50:41.033688 kernel: audit: type=1104 audit(1719885041.000:216): pid=1852 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:50:41.000000 audit[1852]: CRED_DISP pid=1852 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:50:41.085228 sshd[1839]: pam_unix(sshd:session): session closed for user core Jul 2 01:50:41.085000 audit[1839]: USER_END pid=1839 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:50:41.088049 systemd[1]: sshd@5-10.200.20.4:22-10.200.16.10:48908.service: Deactivated successfully. Jul 2 01:50:41.088800 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 01:50:41.090311 systemd-logind[1435]: Session 8 logged out. Waiting for processes to exit. Jul 2 01:50:41.091210 systemd-logind[1435]: Removed session 8. Jul 2 01:50:41.085000 audit[1839]: CRED_DISP pid=1839 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:50:41.126059 kernel: audit: type=1106 audit(1719885041.085:217): pid=1839 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:50:41.126175 kernel: audit: type=1104 audit(1719885041.085:218): pid=1839 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:50:41.126215 kernel: audit: type=1131 audit(1719885041.085:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.4:22-10.200.16.10:48908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:41.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.4:22-10.200.16.10:48908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:41.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.4:22-10.200.16.10:48914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:41.167354 systemd[1]: Started sshd@6-10.200.20.4:22-10.200.16.10:48914.service. Jul 2 01:50:41.655000 audit[1879]: USER_ACCT pid=1879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:50:41.656176 sshd[1879]: Accepted publickey for core from 10.200.16.10 port 48914 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:50:41.656000 audit[1879]: CRED_ACQ pid=1879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:50:41.656000 audit[1879]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9d17260 a2=3 a3=1 items=0 ppid=1 pid=1879 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:41.656000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:50:41.657820 sshd[1879]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:50:41.661884 systemd[1]: Started session-9.scope. Jul 2 01:50:41.662856 systemd-logind[1435]: New session 9 of user core. Jul 2 01:50:41.666000 audit[1879]: USER_START pid=1879 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:50:41.667000 audit[1881]: CRED_ACQ pid=1881 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:50:41.927000 audit[1882]: USER_ACCT pid=1882 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:50:41.928738 sudo[1882]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 01:50:41.928000 audit[1882]: CRED_REFR pid=1882 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:50:41.929283 sudo[1882]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:50:41.929000 audit[1882]: USER_START pid=1882 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:50:41.949984 systemd[1]: Starting docker.service... Jul 2 01:50:41.983299 env[1892]: time="2024-07-02T01:50:41.983245544Z" level=info msg="Starting up" Jul 2 01:50:41.984573 env[1892]: time="2024-07-02T01:50:41.984547685Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 01:50:41.984674 env[1892]: time="2024-07-02T01:50:41.984660483Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 01:50:41.984746 env[1892]: time="2024-07-02T01:50:41.984731122Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 01:50:41.984820 env[1892]: time="2024-07-02T01:50:41.984792681Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 01:50:41.987029 env[1892]: time="2024-07-02T01:50:41.987000849Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 01:50:41.987029 env[1892]: time="2024-07-02T01:50:41.987023689Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 01:50:41.987127 env[1892]: time="2024-07-02T01:50:41.987045008Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 01:50:41.987127 env[1892]: time="2024-07-02T01:50:41.987055368Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 01:50:41.991719 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2620762423-merged.mount: Deactivated successfully. Jul 2 01:50:42.054823 env[1892]: time="2024-07-02T01:50:42.054770745Z" level=info msg="Loading containers: start." Jul 2 01:50:42.153000 audit[1920]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.153000 audit[1920]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffea12b300 a2=0 a3=1 items=0 ppid=1892 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.153000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 01:50:42.154000 audit[1922]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.154000 audit[1922]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc22e7d00 a2=0 a3=1 items=0 ppid=1892 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.154000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 01:50:42.156000 audit[1924]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.156000 audit[1924]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffdeaf48f0 a2=0 a3=1 items=0 ppid=1892 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.156000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 01:50:42.158000 audit[1926]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.158000 audit[1926]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffdd7e6a10 a2=0 a3=1 items=0 ppid=1892 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.158000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 01:50:42.160000 audit[1928]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.160000 audit[1928]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff700c050 a2=0 a3=1 items=0 ppid=1892 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.160000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 01:50:42.162000 audit[1930]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1930 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.162000 audit[1930]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff3a83420 a2=0 a3=1 items=0 ppid=1892 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.162000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 01:50:42.180000 audit[1932]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.180000 audit[1932]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffca93ae60 a2=0 a3=1 items=0 ppid=1892 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.180000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 01:50:42.182000 audit[1934]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.182000 audit[1934]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffe766cbe0 a2=0 a3=1 items=0 ppid=1892 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.182000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 01:50:42.184000 audit[1936]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.184000 audit[1936]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffdcb54c40 a2=0 a3=1 items=0 ppid=1892 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.184000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 01:50:42.201000 audit[1940]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1940 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.201000 audit[1940]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffdd835a60 a2=0 a3=1 items=0 ppid=1892 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.201000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 01:50:42.203000 audit[1941]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.203000 audit[1941]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe48a5a20 a2=0 a3=1 items=0 ppid=1892 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.203000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 01:50:42.229830 kernel: Initializing XFRM netlink socket Jul 2 01:50:42.251433 env[1892]: time="2024-07-02T01:50:42.251380524Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 01:50:42.354000 audit[1949]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1949 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.354000 audit[1949]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=fffff0be2460 a2=0 a3=1 items=0 ppid=1892 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.354000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 01:50:42.375000 audit[1952]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.375000 audit[1952]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffff7d624d0 a2=0 a3=1 items=0 ppid=1892 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.375000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 01:50:42.378000 audit[1955]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1955 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.378000 audit[1955]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffec7fd7d0 a2=0 a3=1 items=0 ppid=1892 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.378000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 01:50:42.379000 audit[1957]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1957 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.379000 audit[1957]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc9b05e10 a2=0 a3=1 items=0 ppid=1892 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.379000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 01:50:42.381000 audit[1959]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.381000 audit[1959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffec8598b0 a2=0 a3=1 items=0 ppid=1892 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.381000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 01:50:42.383000 audit[1961]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.383000 audit[1961]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffd92b8c40 a2=0 a3=1 items=0 ppid=1892 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.383000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 01:50:42.385000 audit[1963]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1963 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.385000 audit[1963]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffe5715980 a2=0 a3=1 items=0 ppid=1892 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.385000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 01:50:42.387000 audit[1965]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.387000 audit[1965]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffdef34120 a2=0 a3=1 items=0 ppid=1892 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.387000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 01:50:42.388000 audit[1967]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1967 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.388000 audit[1967]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffeaa13a10 a2=0 a3=1 items=0 ppid=1892 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.388000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 01:50:42.390000 audit[1969]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1969 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.390000 audit[1969]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffceb83940 a2=0 a3=1 items=0 ppid=1892 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.390000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 01:50:42.392000 audit[1971]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1971 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.392000 audit[1971]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc0397be0 a2=0 a3=1 items=0 ppid=1892 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.392000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 01:50:42.393665 systemd-networkd[1605]: docker0: Link UP Jul 2 01:50:42.410000 audit[1975]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1975 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.410000 audit[1975]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc5352cb0 a2=0 a3=1 items=0 ppid=1892 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.410000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 01:50:42.411000 audit[1976]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:42.411000 audit[1976]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffca4b9560 a2=0 a3=1 items=0 ppid=1892 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.411000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 01:50:42.412423 env[1892]: time="2024-07-02T01:50:42.412385832Z" level=info msg="Loading containers: done." Jul 2 01:50:42.421418 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2815674743-merged.mount: Deactivated successfully. Jul 2 01:50:42.471714 env[1892]: time="2024-07-02T01:50:42.471610538Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 01:50:42.472793 env[1892]: time="2024-07-02T01:50:42.472752563Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 2 01:50:42.473042 env[1892]: time="2024-07-02T01:50:42.473027119Z" level=info msg="Daemon has completed initialization" Jul 2 01:50:42.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:42.502663 systemd[1]: Started docker.service. Jul 2 01:50:42.509234 env[1892]: time="2024-07-02T01:50:42.509167342Z" level=info msg="API listen on /run/docker.sock" Jul 2 01:50:46.453837 env[1468]: time="2024-07-02T01:50:46.453691858Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.11\"" Jul 2 01:50:47.378596 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3773145994.mount: Deactivated successfully. Jul 2 01:50:49.114524 env[1468]: time="2024-07-02T01:50:49.114470456Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:49.122379 env[1468]: time="2024-07-02T01:50:49.122345009Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d2b5500cdb8d455434ebcaa569918eb0c5e68e82d75d4c85c509519786f24a8d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:49.125747 env[1468]: time="2024-07-02T01:50:49.125713137Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:49.129670 env[1468]: time="2024-07-02T01:50:49.129643552Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:aec9d1701c304eee8607d728a39baaa511d65bef6dd9861010618f63fbadeb10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:49.130512 env[1468]: time="2024-07-02T01:50:49.130484364Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.11\" returns image reference \"sha256:d2b5500cdb8d455434ebcaa569918eb0c5e68e82d75d4c85c509519786f24a8d\"" Jul 2 01:50:49.139009 env[1468]: time="2024-07-02T01:50:49.138986415Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.11\"" Jul 2 01:50:50.803380 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. Jul 2 01:50:50.803546 systemd[1]: Stopped kubelet.service. Jul 2 01:50:50.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:50.804911 systemd[1]: Starting kubelet.service... Jul 2 01:50:50.809085 kernel: kauditd_printk_skb: 84 callbacks suppressed Jul 2 01:50:50.809169 kernel: audit: type=1130 audit(1719885050.801:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:50.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:50.840034 kernel: audit: type=1131 audit(1719885050.801:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:50.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:50.916155 systemd[1]: Started kubelet.service. Jul 2 01:50:50.935827 kernel: audit: type=1130 audit(1719885050.914:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:50.996326 kubelet[2024]: E0702 01:50:50.996276 2024 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:50:50.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 01:50:50.998582 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:50:50.998700 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:50:51.016835 kernel: audit: type=1131 audit(1719885050.997:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 01:50:51.493982 env[1468]: time="2024-07-02T01:50:51.493937246Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:51.500667 env[1468]: time="2024-07-02T01:50:51.500639919Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24cd2c3bd254238005fcc2fcc15e9e56347b218c10b8399a28d1bf813800266a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:51.505661 env[1468]: time="2024-07-02T01:50:51.505635540Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:51.510919 env[1468]: time="2024-07-02T01:50:51.510873516Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6014c3572ec683841bbb16f87b94da28ee0254b95e2dba2d1850d62bd0111f09,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:51.511667 env[1468]: time="2024-07-02T01:50:51.511640109Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.11\" returns image reference \"sha256:24cd2c3bd254238005fcc2fcc15e9e56347b218c10b8399a28d1bf813800266a\"" Jul 2 01:50:51.520393 env[1468]: time="2024-07-02T01:50:51.520366482Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.11\"" Jul 2 01:50:53.369025 env[1468]: time="2024-07-02T01:50:53.368967500Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:53.375140 env[1468]: time="2024-07-02T01:50:53.375087118Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fdf13db9a96001adee7d1c69fd6849d6cd45fc3c138c95c8240d353eb79acf50,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:53.379296 env[1468]: time="2024-07-02T01:50:53.379252783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:53.383454 env[1468]: time="2024-07-02T01:50:53.383416127Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:46cf7475c8daffb743c856a1aea0ddea35e5acd2418be18b1e22cf98d9c9b445,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:53.384250 env[1468]: time="2024-07-02T01:50:53.384222120Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.11\" returns image reference \"sha256:fdf13db9a96001adee7d1c69fd6849d6cd45fc3c138c95c8240d353eb79acf50\"" Jul 2 01:50:53.392435 env[1468]: time="2024-07-02T01:50:53.392402747Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.11\"" Jul 2 01:50:54.512666 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount21430470.mount: Deactivated successfully. Jul 2 01:50:54.958715 env[1468]: time="2024-07-02T01:50:54.958660593Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:54.965701 env[1468]: time="2024-07-02T01:50:54.965656268Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e195d3cf134bc9d64104f5e82e95fce811d55b1cdc9cb26fb8f52c8d107d1661,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:54.969908 env[1468]: time="2024-07-02T01:50:54.969861802Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:54.975153 env[1468]: time="2024-07-02T01:50:54.975119400Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ae4b671d4cfc23dd75030bb4490207cd939b3b11a799bcb4119698cd712eb5b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:54.975630 env[1468]: time="2024-07-02T01:50:54.975597465Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.11\" returns image reference \"sha256:e195d3cf134bc9d64104f5e82e95fce811d55b1cdc9cb26fb8f52c8d107d1661\"" Jul 2 01:50:54.985285 env[1468]: time="2024-07-02T01:50:54.985239621Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Jul 2 01:50:55.661448 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1614468109.mount: Deactivated successfully. Jul 2 01:50:55.688623 env[1468]: time="2024-07-02T01:50:55.688551609Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:55.695943 env[1468]: time="2024-07-02T01:50:55.695907547Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:55.699875 env[1468]: time="2024-07-02T01:50:55.699849071Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:55.704858 env[1468]: time="2024-07-02T01:50:55.704822851Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:55.705484 env[1468]: time="2024-07-02T01:50:55.705455976Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Jul 2 01:50:55.714616 env[1468]: time="2024-07-02T01:50:55.714575668Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Jul 2 01:50:56.381484 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1142343143.mount: Deactivated successfully. Jul 2 01:50:59.514647 env[1468]: time="2024-07-02T01:50:59.514590539Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:59.522740 env[1468]: time="2024-07-02T01:50:59.522713109Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:59.528510 env[1468]: time="2024-07-02T01:50:59.528487199Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:59.532759 env[1468]: time="2024-07-02T01:50:59.532735906Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:59.533659 env[1468]: time="2024-07-02T01:50:59.533632694Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b\"" Jul 2 01:50:59.542781 env[1468]: time="2024-07-02T01:50:59.542753103Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Jul 2 01:51:00.225974 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2457656672.mount: Deactivated successfully. Jul 2 01:51:00.872119 env[1468]: time="2024-07-02T01:51:00.872065272Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:00.881672 env[1468]: time="2024-07-02T01:51:00.881635145Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:00.886882 env[1468]: time="2024-07-02T01:51:00.886843991Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:00.893283 env[1468]: time="2024-07-02T01:51:00.893256017Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:00.893741 env[1468]: time="2024-07-02T01:51:00.893714630Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Jul 2 01:51:01.053406 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 7. Jul 2 01:51:01.053583 systemd[1]: Stopped kubelet.service. Jul 2 01:51:01.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:01.055009 systemd[1]: Starting kubelet.service... Jul 2 01:51:01.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:01.088690 kernel: audit: type=1130 audit(1719885061.052:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:01.088772 kernel: audit: type=1131 audit(1719885061.052:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:01.133753 systemd[1]: Started kubelet.service. Jul 2 01:51:01.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:01.151876 kernel: audit: type=1130 audit(1719885061.133:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:01.183955 kubelet[2065]: E0702 01:51:01.183910 2065 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:51:01.185996 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:51:01.186121 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:51:01.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 01:51:01.203839 kernel: audit: type=1131 audit(1719885061.185:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 01:51:06.191087 systemd[1]: Stopped kubelet.service. Jul 2 01:51:06.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:06.193173 systemd[1]: Starting kubelet.service... Jul 2 01:51:06.212883 kernel: audit: type=1130 audit(1719885066.190:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:06.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:06.230821 kernel: audit: type=1131 audit(1719885066.190:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:06.242232 systemd[1]: Reloading. Jul 2 01:51:06.324616 /usr/lib/systemd/system-generators/torcx-generator[2150]: time="2024-07-02T01:51:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 01:51:06.325013 /usr/lib/systemd/system-generators/torcx-generator[2150]: time="2024-07-02T01:51:06Z" level=info msg="torcx already run" Jul 2 01:51:06.401799 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 01:51:06.401844 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 01:51:06.417528 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 01:51:06.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.518896 kernel: audit: type=1400 audit(1719885066.484:264): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.518977 kernel: audit: type=1400 audit(1719885066.484:265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.535463 kernel: audit: type=1400 audit(1719885066.484:266): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.554902 kernel: audit: type=1400 audit(1719885066.484:267): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.572148 kernel: audit: type=1400 audit(1719885066.484:268): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.589715 kernel: audit: type=1400 audit(1719885066.484:269): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.589870 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 01:51:06.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.610812 kernel: audit: type=1400 audit(1719885066.484:270): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.500000 audit: BPF prog-id=44 op=LOAD Jul 2 01:51:06.500000 audit: BPF prog-id=37 op=UNLOAD Jul 2 01:51:06.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.517000 audit: BPF prog-id=45 op=LOAD Jul 2 01:51:06.517000 audit: BPF prog-id=41 op=UNLOAD Jul 2 01:51:06.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.533000 audit: BPF prog-id=46 op=LOAD Jul 2 01:51:06.533000 audit: BPF prog-id=43 op=UNLOAD Jul 2 01:51:06.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.554000 audit: BPF prog-id=47 op=LOAD Jul 2 01:51:06.554000 audit: BPF prog-id=38 op=UNLOAD Jul 2 01:51:06.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.570000 audit: BPF prog-id=48 op=LOAD Jul 2 01:51:06.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.570000 audit: BPF prog-id=49 op=LOAD Jul 2 01:51:06.570000 audit: BPF prog-id=39 op=UNLOAD Jul 2 01:51:06.570000 audit: BPF prog-id=40 op=UNLOAD Jul 2 01:51:06.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.609000 audit: BPF prog-id=50 op=LOAD Jul 2 01:51:06.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.609000 audit: BPF prog-id=29 op=UNLOAD Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit: BPF prog-id=52 op=LOAD Jul 2 01:51:06.611000 audit: BPF prog-id=30 op=UNLOAD Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit: BPF prog-id=53 op=LOAD Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.611000 audit: BPF prog-id=54 op=LOAD Jul 2 01:51:06.611000 audit: BPF prog-id=31 op=UNLOAD Jul 2 01:51:06.611000 audit: BPF prog-id=32 op=UNLOAD Jul 2 01:51:06.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.614000 audit: BPF prog-id=55 op=LOAD Jul 2 01:51:06.614000 audit: BPF prog-id=36 op=UNLOAD Jul 2 01:51:06.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit: BPF prog-id=56 op=LOAD Jul 2 01:51:06.616000 audit: BPF prog-id=33 op=UNLOAD Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit: BPF prog-id=57 op=LOAD Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:06.616000 audit: BPF prog-id=58 op=LOAD Jul 2 01:51:06.616000 audit: BPF prog-id=34 op=UNLOAD Jul 2 01:51:06.616000 audit: BPF prog-id=35 op=UNLOAD Jul 2 01:51:06.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:06.632266 systemd[1]: Started kubelet.service. Jul 2 01:51:06.637067 systemd[1]: Stopping kubelet.service... Jul 2 01:51:06.638004 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 01:51:06.638184 systemd[1]: Stopped kubelet.service. Jul 2 01:51:06.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:06.639688 systemd[1]: Starting kubelet.service... Jul 2 01:51:06.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:06.717706 systemd[1]: Started kubelet.service. Jul 2 01:51:06.773654 kubelet[2222]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 01:51:06.773979 kubelet[2222]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 01:51:06.774034 kubelet[2222]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 01:51:06.774167 kubelet[2222]: I0702 01:51:06.774134 2222 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 01:51:07.882492 kubelet[2222]: I0702 01:51:07.882461 2222 server.go:467] "Kubelet version" kubeletVersion="v1.28.7" Jul 2 01:51:07.882829 kubelet[2222]: I0702 01:51:07.882797 2222 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 01:51:07.883152 kubelet[2222]: I0702 01:51:07.883136 2222 server.go:895] "Client rotation is on, will bootstrap in background" Jul 2 01:51:07.903150 kubelet[2222]: I0702 01:51:07.903127 2222 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 01:51:07.907118 kubelet[2222]: E0702 01:51:07.907081 2222 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.4:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:07.914879 kubelet[2222]: W0702 01:51:07.914859 2222 machine.go:65] Cannot read vendor id correctly, set empty. Jul 2 01:51:07.915472 kubelet[2222]: I0702 01:51:07.915456 2222 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 01:51:07.915841 kubelet[2222]: I0702 01:51:07.915826 2222 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 01:51:07.916265 kubelet[2222]: I0702 01:51:07.916230 2222 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 01:51:07.916373 kubelet[2222]: I0702 01:51:07.916271 2222 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 01:51:07.916373 kubelet[2222]: I0702 01:51:07.916282 2222 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 01:51:07.916423 kubelet[2222]: I0702 01:51:07.916390 2222 state_mem.go:36] "Initialized new in-memory state store" Jul 2 01:51:07.918103 kubelet[2222]: I0702 01:51:07.918068 2222 kubelet.go:393] "Attempting to sync node with API server" Jul 2 01:51:07.918178 kubelet[2222]: I0702 01:51:07.918111 2222 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 01:51:07.918178 kubelet[2222]: I0702 01:51:07.918143 2222 kubelet.go:309] "Adding apiserver pod source" Jul 2 01:51:07.918178 kubelet[2222]: I0702 01:51:07.918154 2222 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 01:51:07.922636 kubelet[2222]: I0702 01:51:07.922618 2222 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 01:51:07.931497 kubelet[2222]: W0702 01:51:07.931470 2222 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 01:51:07.932123 kubelet[2222]: I0702 01:51:07.932108 2222 server.go:1232] "Started kubelet" Jul 2 01:51:07.932345 kubelet[2222]: W0702 01:51:07.932312 2222 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:07.932431 kubelet[2222]: E0702 01:51:07.932421 2222 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:07.932772 kubelet[2222]: W0702 01:51:07.932733 2222 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-6c47a6a388&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:07.932772 kubelet[2222]: E0702 01:51:07.932773 2222 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-6c47a6a388&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:07.932913 kubelet[2222]: I0702 01:51:07.932894 2222 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 01:51:07.935118 kubelet[2222]: I0702 01:51:07.935094 2222 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Jul 2 01:51:07.933000 audit[2222]: AVC avc: denied { mac_admin } for pid=2222 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:07.933000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:51:07.933000 audit[2222]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400079a060 a1=400078a408 a2=400079a030 a3=25 items=0 ppid=1 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:07.933000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:51:07.936051 kubelet[2222]: I0702 01:51:07.936033 2222 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 01:51:07.936151 kubelet[2222]: I0702 01:51:07.935168 2222 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 01:51:07.934000 audit[2222]: AVC avc: denied { mac_admin } for pid=2222 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:07.934000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:51:07.934000 audit[2222]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400077ce00 a1=4000c4c048 a2=4000a14a20 a3=25 items=0 ppid=1 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:07.934000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:51:07.936445 kubelet[2222]: I0702 01:51:07.936428 2222 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 01:51:07.936578 kubelet[2222]: I0702 01:51:07.936566 2222 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 01:51:07.938181 kubelet[2222]: E0702 01:51:07.938072 2222 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.5-a-6c47a6a388.17de425b60972b4d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.5-a-6c47a6a388", UID:"ci-3510.3.5-a-6c47a6a388", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.5-a-6c47a6a388"}, FirstTimestamp:time.Date(2024, time.July, 2, 1, 51, 7, 932085069, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 1, 51, 7, 932085069, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.5-a-6c47a6a388"}': 'Post "https://10.200.20.4:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.4:6443: connect: connection refused'(may retry after sleeping) Jul 2 01:51:07.938295 kubelet[2222]: E0702 01:51:07.938248 2222 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Jul 2 01:51:07.938295 kubelet[2222]: E0702 01:51:07.938267 2222 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 01:51:07.939848 kubelet[2222]: I0702 01:51:07.935219 2222 server.go:462] "Adding debug handlers to kubelet server" Jul 2 01:51:07.939000 audit[2232]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:07.939000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd7a80380 a2=0 a3=1 items=0 ppid=2222 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:07.939000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 01:51:07.942581 kubelet[2222]: E0702 01:51:07.941864 2222 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.5-a-6c47a6a388\" not found" Jul 2 01:51:07.942581 kubelet[2222]: I0702 01:51:07.941894 2222 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 01:51:07.942581 kubelet[2222]: I0702 01:51:07.941968 2222 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 01:51:07.942581 kubelet[2222]: I0702 01:51:07.942017 2222 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 01:51:07.942581 kubelet[2222]: W0702 01:51:07.942306 2222 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:07.942581 kubelet[2222]: E0702 01:51:07.942337 2222 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:07.943326 kubelet[2222]: E0702 01:51:07.942964 2222 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-6c47a6a388?timeout=10s\": dial tcp 10.200.20.4:6443: connect: connection refused" interval="200ms" Jul 2 01:51:07.943000 audit[2233]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:07.943000 audit[2233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe597a080 a2=0 a3=1 items=0 ppid=2222 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:07.943000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 01:51:07.947000 audit[2235]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:07.947000 audit[2235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffddb0b0f0 a2=0 a3=1 items=0 ppid=2222 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:07.947000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 01:51:07.949000 audit[2237]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:07.949000 audit[2237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff6c0f100 a2=0 a3=1 items=0 ppid=2222 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:07.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 01:51:08.012207 kubelet[2222]: I0702 01:51:08.012170 2222 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 01:51:08.012385 kubelet[2222]: I0702 01:51:08.012375 2222 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 01:51:08.012465 kubelet[2222]: I0702 01:51:08.012457 2222 state_mem.go:36] "Initialized new in-memory state store" Jul 2 01:51:08.019281 kubelet[2222]: I0702 01:51:08.019248 2222 policy_none.go:49] "None policy: Start" Jul 2 01:51:08.020145 kubelet[2222]: I0702 01:51:08.020125 2222 memory_manager.go:169] "Starting memorymanager" policy="None" Jul 2 01:51:08.020220 kubelet[2222]: I0702 01:51:08.020153 2222 state_mem.go:35] "Initializing new in-memory state store" Jul 2 01:51:08.030135 systemd[1]: Created slice kubepods.slice. Jul 2 01:51:08.034680 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 01:51:08.044768 kubelet[2222]: I0702 01:51:08.044736 2222 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.045241 kubelet[2222]: E0702 01:51:08.045216 2222 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.4:6443/api/v1/nodes\": dial tcp 10.200.20.4:6443: connect: connection refused" node="ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.048154 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 01:51:08.048000 audit[2222]: AVC avc: denied { mac_admin } for pid=2222 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:08.048000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:51:08.048000 audit[2222]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000df6810 a1=4000ec68b8 a2=4000df67e0 a3=25 items=0 ppid=1 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:08.048000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:51:08.051393 kubelet[2222]: I0702 01:51:08.050267 2222 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 01:51:08.051393 kubelet[2222]: I0702 01:51:08.050366 2222 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 01:51:08.051393 kubelet[2222]: I0702 01:51:08.050557 2222 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 01:51:08.053286 kubelet[2222]: E0702 01:51:08.053268 2222 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.5-a-6c47a6a388\" not found" Jul 2 01:51:08.054000 audit[2245]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:08.054000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd7baeef0 a2=0 a3=1 items=0 ppid=2222 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:08.054000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 01:51:08.056422 kubelet[2222]: I0702 01:51:08.056399 2222 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 01:51:08.055000 audit[2246]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:08.055000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe9440a10 a2=0 a3=1 items=0 ppid=2222 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:08.055000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 01:51:08.058085 kubelet[2222]: I0702 01:51:08.058061 2222 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 01:51:08.058203 kubelet[2222]: I0702 01:51:08.058194 2222 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 01:51:08.058289 kubelet[2222]: I0702 01:51:08.058280 2222 kubelet.go:2303] "Starting kubelet main sync loop" Jul 2 01:51:08.058386 kubelet[2222]: E0702 01:51:08.058378 2222 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 2 01:51:08.059573 kubelet[2222]: W0702 01:51:08.059535 2222 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:08.059689 kubelet[2222]: E0702 01:51:08.059679 2222 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:08.058000 audit[2247]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:08.058000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc12c6a30 a2=0 a3=1 items=0 ppid=2222 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:08.058000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 01:51:08.059000 audit[2249]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:08.059000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff74f4970 a2=0 a3=1 items=0 ppid=2222 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:08.059000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 01:51:08.060000 audit[2248]: NETFILTER_CFG table=mangle:37 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:08.060000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdc98d7c0 a2=0 a3=1 items=0 ppid=2222 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:08.060000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 01:51:08.060000 audit[2250]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:08.060000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff9d7d480 a2=0 a3=1 items=0 ppid=2222 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:08.060000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 01:51:08.062000 audit[2251]: NETFILTER_CFG table=nat:39 family=10 entries=2 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:08.062000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffffb64a990 a2=0 a3=1 items=0 ppid=2222 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:08.062000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 01:51:08.063000 audit[2252]: NETFILTER_CFG table=filter:40 family=10 entries=2 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:08.063000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffead0e2d0 a2=0 a3=1 items=0 ppid=2222 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:08.063000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 01:51:08.144245 kubelet[2222]: E0702 01:51:08.144155 2222 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-6c47a6a388?timeout=10s\": dial tcp 10.200.20.4:6443: connect: connection refused" interval="400ms" Jul 2 01:51:08.159413 kubelet[2222]: I0702 01:51:08.159387 2222 topology_manager.go:215] "Topology Admit Handler" podUID="3d1954c9b8bafe1eb6795fb6a24b2857" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.161040 kubelet[2222]: I0702 01:51:08.161019 2222 topology_manager.go:215] "Topology Admit Handler" podUID="14c1190f99450c826486fbda5bc13c7c" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.162330 kubelet[2222]: I0702 01:51:08.162312 2222 topology_manager.go:215] "Topology Admit Handler" podUID="3e7c0049ff33f250898f55ff34f277c4" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.167135 systemd[1]: Created slice kubepods-burstable-pod3d1954c9b8bafe1eb6795fb6a24b2857.slice. Jul 2 01:51:08.185377 systemd[1]: Created slice kubepods-burstable-pod14c1190f99450c826486fbda5bc13c7c.slice. Jul 2 01:51:08.200693 systemd[1]: Created slice kubepods-burstable-pod3e7c0049ff33f250898f55ff34f277c4.slice. Jul 2 01:51:08.244237 kubelet[2222]: I0702 01:51:08.244212 2222 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3e7c0049ff33f250898f55ff34f277c4-kubeconfig\") pod \"kube-scheduler-ci-3510.3.5-a-6c47a6a388\" (UID: \"3e7c0049ff33f250898f55ff34f277c4\") " pod="kube-system/kube-scheduler-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.244460 kubelet[2222]: I0702 01:51:08.244447 2222 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3d1954c9b8bafe1eb6795fb6a24b2857-k8s-certs\") pod \"kube-apiserver-ci-3510.3.5-a-6c47a6a388\" (UID: \"3d1954c9b8bafe1eb6795fb6a24b2857\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.244608 kubelet[2222]: I0702 01:51:08.244598 2222 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3d1954c9b8bafe1eb6795fb6a24b2857-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.5-a-6c47a6a388\" (UID: \"3d1954c9b8bafe1eb6795fb6a24b2857\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.244728 kubelet[2222]: I0702 01:51:08.244718 2222 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/14c1190f99450c826486fbda5bc13c7c-ca-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-6c47a6a388\" (UID: \"14c1190f99450c826486fbda5bc13c7c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.244862 kubelet[2222]: I0702 01:51:08.244853 2222 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/14c1190f99450c826486fbda5bc13c7c-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-6c47a6a388\" (UID: \"14c1190f99450c826486fbda5bc13c7c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.244966 kubelet[2222]: I0702 01:51:08.244957 2222 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/14c1190f99450c826486fbda5bc13c7c-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.5-a-6c47a6a388\" (UID: \"14c1190f99450c826486fbda5bc13c7c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.245078 kubelet[2222]: I0702 01:51:08.245069 2222 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3d1954c9b8bafe1eb6795fb6a24b2857-ca-certs\") pod \"kube-apiserver-ci-3510.3.5-a-6c47a6a388\" (UID: \"3d1954c9b8bafe1eb6795fb6a24b2857\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.245190 kubelet[2222]: I0702 01:51:08.245175 2222 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/14c1190f99450c826486fbda5bc13c7c-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.5-a-6c47a6a388\" (UID: \"14c1190f99450c826486fbda5bc13c7c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.245309 kubelet[2222]: I0702 01:51:08.245297 2222 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/14c1190f99450c826486fbda5bc13c7c-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.5-a-6c47a6a388\" (UID: \"14c1190f99450c826486fbda5bc13c7c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.246744 kubelet[2222]: I0702 01:51:08.246729 2222 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.247158 kubelet[2222]: E0702 01:51:08.247144 2222 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.4:6443/api/v1/nodes\": dial tcp 10.200.20.4:6443: connect: connection refused" node="ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.484754 env[1468]: time="2024-07-02T01:51:08.484652396Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.5-a-6c47a6a388,Uid:3d1954c9b8bafe1eb6795fb6a24b2857,Namespace:kube-system,Attempt:0,}" Jul 2 01:51:08.488452 env[1468]: time="2024-07-02T01:51:08.488293421Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.5-a-6c47a6a388,Uid:14c1190f99450c826486fbda5bc13c7c,Namespace:kube-system,Attempt:0,}" Jul 2 01:51:08.503747 env[1468]: time="2024-07-02T01:51:08.503715482Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.5-a-6c47a6a388,Uid:3e7c0049ff33f250898f55ff34f277c4,Namespace:kube-system,Attempt:0,}" Jul 2 01:51:08.545461 kubelet[2222]: E0702 01:51:08.545438 2222 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-6c47a6a388?timeout=10s\": dial tcp 10.200.20.4:6443: connect: connection refused" interval="800ms" Jul 2 01:51:08.649412 kubelet[2222]: I0702 01:51:08.649391 2222 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.649963 kubelet[2222]: E0702 01:51:08.649948 2222 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.4:6443/api/v1/nodes\": dial tcp 10.200.20.4:6443: connect: connection refused" node="ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:08.783795 kubelet[2222]: W0702 01:51:08.783686 2222 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:08.783795 kubelet[2222]: E0702 01:51:08.783742 2222 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:08.809163 kubelet[2222]: W0702 01:51:08.809117 2222 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:08.809333 kubelet[2222]: E0702 01:51:08.809323 2222 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:09.062604 kubelet[2222]: W0702 01:51:09.062524 2222 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-6c47a6a388&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:09.062604 kubelet[2222]: E0702 01:51:09.062577 2222 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-6c47a6a388&limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:09.346246 kubelet[2222]: E0702 01:51:09.346145 2222 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-6c47a6a388?timeout=10s\": dial tcp 10.200.20.4:6443: connect: connection refused" interval="1.6s" Jul 2 01:51:09.452122 kubelet[2222]: I0702 01:51:09.452074 2222 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:09.452407 kubelet[2222]: E0702 01:51:09.452383 2222 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.4:6443/api/v1/nodes\": dial tcp 10.200.20.4:6443: connect: connection refused" node="ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:09.495990 kubelet[2222]: W0702 01:51:09.495946 2222 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:09.496073 kubelet[2222]: E0702 01:51:09.495999 2222 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:09.678407 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3995033312.mount: Deactivated successfully. Jul 2 01:51:09.701199 env[1468]: time="2024-07-02T01:51:09.701153748Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:09.716280 env[1468]: time="2024-07-02T01:51:09.716227221Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:09.719651 env[1468]: time="2024-07-02T01:51:09.719625295Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:09.722854 env[1468]: time="2024-07-02T01:51:09.722828511Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:09.729420 env[1468]: time="2024-07-02T01:51:09.729394717Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:09.732703 env[1468]: time="2024-07-02T01:51:09.732666299Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:09.736079 env[1468]: time="2024-07-02T01:51:09.736052252Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:09.745580 env[1468]: time="2024-07-02T01:51:09.745552170Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:09.749296 env[1468]: time="2024-07-02T01:51:09.749251152Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:09.753412 env[1468]: time="2024-07-02T01:51:09.753376293Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:09.768971 env[1468]: time="2024-07-02T01:51:09.768942251Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:09.788600 env[1468]: time="2024-07-02T01:51:09.788569024Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:09.833632 env[1468]: time="2024-07-02T01:51:09.833561981Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:51:09.833632 env[1468]: time="2024-07-02T01:51:09.833601344Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:51:09.833813 env[1468]: time="2024-07-02T01:51:09.833611585Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:51:09.834665 env[1468]: time="2024-07-02T01:51:09.833970538Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bf689bd46bc4a0da53813544eb91de35b727de218dd0e8c940c0273945e237d3 pid=2261 runtime=io.containerd.runc.v2 Jul 2 01:51:09.840622 env[1468]: time="2024-07-02T01:51:09.840570548Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:51:09.841421 env[1468]: time="2024-07-02T01:51:09.840699080Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:51:09.841421 env[1468]: time="2024-07-02T01:51:09.840727163Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:51:09.841421 env[1468]: time="2024-07-02T01:51:09.840885937Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e0a843a640d44a83b148a48ac34aa60bc8abdccb4fb7ad3500f30df87167627a pid=2277 runtime=io.containerd.runc.v2 Jul 2 01:51:09.858853 systemd[1]: Started cri-containerd-bf689bd46bc4a0da53813544eb91de35b727de218dd0e8c940c0273945e237d3.scope. Jul 2 01:51:09.874084 systemd[1]: Started cri-containerd-e0a843a640d44a83b148a48ac34aa60bc8abdccb4fb7ad3500f30df87167627a.scope. Jul 2 01:51:09.879714 env[1468]: time="2024-07-02T01:51:09.879653599Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:51:09.879919 env[1468]: time="2024-07-02T01:51:09.879895541Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:51:09.880021 env[1468]: time="2024-07-02T01:51:09.880001271Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:51:09.880209 env[1468]: time="2024-07-02T01:51:09.880183888Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/db87f4f65676e8a4b8aef5f088f1ae029b244835dd095fa4c276ff1bc3d69410 pid=2321 runtime=io.containerd.runc.v2 Jul 2 01:51:09.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.882000 audit: BPF prog-id=59 op=LOAD Jul 2 01:51:09.883000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.883000 audit[2283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2261 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:09.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266363839626434366263346130646135333831333534346562393164 Jul 2 01:51:09.883000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.883000 audit[2283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2261 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:09.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266363839626434366263346130646135333831333534346562393164 Jul 2 01:51:09.883000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.883000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.883000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.883000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.883000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.883000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.883000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.883000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.883000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.883000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.883000 audit: BPF prog-id=60 op=LOAD Jul 2 01:51:09.883000 audit[2283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2261 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:09.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266363839626434366263346130646135333831333534346562393164 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit: BPF prog-id=61 op=LOAD Jul 2 01:51:09.884000 audit[2283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2261 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:09.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266363839626434366263346130646135333831333534346562393164 Jul 2 01:51:09.884000 audit: BPF prog-id=61 op=UNLOAD Jul 2 01:51:09.884000 audit: BPF prog-id=60 op=UNLOAD Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.884000 audit: BPF prog-id=62 op=LOAD Jul 2 01:51:09.884000 audit[2283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2261 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:09.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266363839626434366263346130646135333831333534346562393164 Jul 2 01:51:09.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.893000 audit: BPF prog-id=63 op=LOAD Jul 2 01:51:09.895000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.895000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000151b38 a2=10 a3=0 items=0 ppid=2277 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:09.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530613834336136343064343461383362313438613438616333346161 Jul 2 01:51:09.895000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.895000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001515a0 a2=3c a3=0 items=0 ppid=2277 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:09.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530613834336136343064343461383362313438613438616333346161 Jul 2 01:51:09.896000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.896000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.896000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.896000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.896000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.896000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.896000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.896000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.896000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.896000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.896000 audit: BPF prog-id=64 op=LOAD Jul 2 01:51:09.896000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001518e0 a2=78 a3=0 items=0 ppid=2277 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:09.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530613834336136343064343461383362313438613438616333346161 Jul 2 01:51:09.897000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.897000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.897000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.897000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.897000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.897000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.897000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.897000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.897000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.897000 audit: BPF prog-id=65 op=LOAD Jul 2 01:51:09.897000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000151670 a2=78 a3=0 items=0 ppid=2277 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:09.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530613834336136343064343461383362313438613438616333346161 Jul 2 01:51:09.899000 audit: BPF prog-id=65 op=UNLOAD Jul 2 01:51:09.899000 audit: BPF prog-id=64 op=UNLOAD Jul 2 01:51:09.899000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.899000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.899000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.899000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.899000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.899000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.899000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.899000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.899000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.899000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.899000 audit: BPF prog-id=66 op=LOAD Jul 2 01:51:09.899000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000151b40 a2=78 a3=0 items=0 ppid=2277 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:09.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530613834336136343064343461383362313438613438616333346161 Jul 2 01:51:09.908707 systemd[1]: Started cri-containerd-db87f4f65676e8a4b8aef5f088f1ae029b244835dd095fa4c276ff1bc3d69410.scope. Jul 2 01:51:09.916871 env[1468]: time="2024-07-02T01:51:09.916830593Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.5-a-6c47a6a388,Uid:3e7c0049ff33f250898f55ff34f277c4,Namespace:kube-system,Attempt:0,} returns sandbox id \"bf689bd46bc4a0da53813544eb91de35b727de218dd0e8c940c0273945e237d3\"" Jul 2 01:51:09.920285 env[1468]: time="2024-07-02T01:51:09.920257310Z" level=info msg="CreateContainer within sandbox \"bf689bd46bc4a0da53813544eb91de35b727de218dd0e8c940c0273945e237d3\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 2 01:51:09.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.929000 audit: BPF prog-id=67 op=LOAD Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2321 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:09.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462383766346636353637366538613462386165663566303838663161 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2321 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:09.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462383766346636353637366538613462386165663566303838663161 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit: BPF prog-id=68 op=LOAD Jul 2 01:51:09.933000 audit[2334]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2321 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:09.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462383766346636353637366538613462386165663566303838663161 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit: BPF prog-id=69 op=LOAD Jul 2 01:51:09.933000 audit[2334]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2321 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:09.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462383766346636353637366538613462386165663566303838663161 Jul 2 01:51:09.933000 audit: BPF prog-id=69 op=UNLOAD Jul 2 01:51:09.933000 audit: BPF prog-id=68 op=UNLOAD Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:09.933000 audit: BPF prog-id=70 op=LOAD Jul 2 01:51:09.933000 audit[2334]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2321 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:09.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462383766346636353637366538613462386165663566303838663161 Jul 2 01:51:09.940173 env[1468]: time="2024-07-02T01:51:09.940131826Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.5-a-6c47a6a388,Uid:14c1190f99450c826486fbda5bc13c7c,Namespace:kube-system,Attempt:0,} returns sandbox id \"e0a843a640d44a83b148a48ac34aa60bc8abdccb4fb7ad3500f30df87167627a\"" Jul 2 01:51:09.943446 env[1468]: time="2024-07-02T01:51:09.943416330Z" level=info msg="CreateContainer within sandbox \"e0a843a640d44a83b148a48ac34aa60bc8abdccb4fb7ad3500f30df87167627a\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 2 01:51:09.958966 env[1468]: time="2024-07-02T01:51:09.958933163Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.5-a-6c47a6a388,Uid:3d1954c9b8bafe1eb6795fb6a24b2857,Namespace:kube-system,Attempt:0,} returns sandbox id \"db87f4f65676e8a4b8aef5f088f1ae029b244835dd095fa4c276ff1bc3d69410\"" Jul 2 01:51:09.961685 env[1468]: time="2024-07-02T01:51:09.961650214Z" level=info msg="CreateContainer within sandbox \"db87f4f65676e8a4b8aef5f088f1ae029b244835dd095fa4c276ff1bc3d69410\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 2 01:51:09.972028 kubelet[2222]: E0702 01:51:09.971994 2222 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.4:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.4:6443: connect: connection refused Jul 2 01:51:09.972943 env[1468]: time="2024-07-02T01:51:09.972915135Z" level=info msg="CreateContainer within sandbox \"bf689bd46bc4a0da53813544eb91de35b727de218dd0e8c940c0273945e237d3\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"b0b79e45ce51dc68be46da64a0686025d8a71b7517b4482e6ca033f3660d8e53\"" Jul 2 01:51:09.973602 env[1468]: time="2024-07-02T01:51:09.973564195Z" level=info msg="StartContainer for \"b0b79e45ce51dc68be46da64a0686025d8a71b7517b4482e6ca033f3660d8e53\"" Jul 2 01:51:09.994602 systemd[1]: Started cri-containerd-b0b79e45ce51dc68be46da64a0686025d8a71b7517b4482e6ca033f3660d8e53.scope. Jul 2 01:51:10.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.009000 audit: BPF prog-id=71 op=LOAD Jul 2 01:51:10.010000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.010000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2261 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:10.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230623739653435636535316463363862653436646136346130363836 Jul 2 01:51:10.010000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.010000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2261 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:10.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230623739653435636535316463363862653436646136346130363836 Jul 2 01:51:10.010000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.010000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.010000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.010000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.010000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.010000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.010000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.010000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.010000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.010000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.010000 audit: BPF prog-id=72 op=LOAD Jul 2 01:51:10.010000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2261 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:10.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230623739653435636535316463363862653436646136346130363836 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit: BPF prog-id=73 op=LOAD Jul 2 01:51:10.011000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2261 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:10.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230623739653435636535316463363862653436646136346130363836 Jul 2 01:51:10.011000 audit: BPF prog-id=73 op=UNLOAD Jul 2 01:51:10.011000 audit: BPF prog-id=72 op=UNLOAD Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.011000 audit: BPF prog-id=74 op=LOAD Jul 2 01:51:10.011000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2261 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:10.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230623739653435636535316463363862653436646136346130363836 Jul 2 01:51:10.015009 env[1468]: time="2024-07-02T01:51:10.014972708Z" level=info msg="CreateContainer within sandbox \"e0a843a640d44a83b148a48ac34aa60bc8abdccb4fb7ad3500f30df87167627a\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"4f2c47004adf7044dade1bcb468ba4193f6a2fd34c9e0ad97f5dcd6a75706968\"" Jul 2 01:51:10.015604 env[1468]: time="2024-07-02T01:51:10.015582923Z" level=info msg="StartContainer for \"4f2c47004adf7044dade1bcb468ba4193f6a2fd34c9e0ad97f5dcd6a75706968\"" Jul 2 01:51:10.026962 env[1468]: time="2024-07-02T01:51:10.026927746Z" level=info msg="CreateContainer within sandbox \"db87f4f65676e8a4b8aef5f088f1ae029b244835dd095fa4c276ff1bc3d69410\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"e089752ae7d30ec2425d61cb3434ef2a20a99f87fca26c7de13ddfcae6a894a8\"" Jul 2 01:51:10.027413 env[1468]: time="2024-07-02T01:51:10.027389987Z" level=info msg="StartContainer for \"e089752ae7d30ec2425d61cb3434ef2a20a99f87fca26c7de13ddfcae6a894a8\"" Jul 2 01:51:10.032793 systemd[1]: Started cri-containerd-4f2c47004adf7044dade1bcb468ba4193f6a2fd34c9e0ad97f5dcd6a75706968.scope. Jul 2 01:51:10.051287 env[1468]: time="2024-07-02T01:51:10.051237577Z" level=info msg="StartContainer for \"b0b79e45ce51dc68be46da64a0686025d8a71b7517b4482e6ca033f3660d8e53\" returns successfully" Jul 2 01:51:10.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.054000 audit: BPF prog-id=75 op=LOAD Jul 2 01:51:10.055000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.055000 audit[2413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2277 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:10.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466326334373030346164663730343464616465316263623436386261 Jul 2 01:51:10.055000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.055000 audit[2413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2277 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:10.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466326334373030346164663730343464616465316263623436386261 Jul 2 01:51:10.055000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.055000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.055000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.055000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.055000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.055000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.055000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.055000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.055000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.055000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.055000 audit: BPF prog-id=76 op=LOAD Jul 2 01:51:10.055000 audit[2413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2277 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:10.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466326334373030346164663730343464616465316263623436386261 Jul 2 01:51:10.056000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.056000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.056000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.056000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.056000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.056000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.056000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.056000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.056000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.056000 audit: BPF prog-id=77 op=LOAD Jul 2 01:51:10.056000 audit[2413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2277 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:10.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466326334373030346164663730343464616465316263623436386261 Jul 2 01:51:10.057000 audit: BPF prog-id=77 op=UNLOAD Jul 2 01:51:10.057000 audit: BPF prog-id=76 op=UNLOAD Jul 2 01:51:10.057000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.057000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.057000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.057000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.057000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.057000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.057000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.057000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.057000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.057000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.057000 audit: BPF prog-id=78 op=LOAD Jul 2 01:51:10.057000 audit[2413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2277 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:10.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466326334373030346164663730343464616465316263623436386261 Jul 2 01:51:10.067287 systemd[1]: Started cri-containerd-e089752ae7d30ec2425d61cb3434ef2a20a99f87fca26c7de13ddfcae6a894a8.scope. Jul 2 01:51:10.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.098000 audit: BPF prog-id=79 op=LOAD Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000231b38 a2=10 a3=0 items=0 ppid=2321 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:10.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530383937353261653764333065633234323564363163623334333465 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40002315a0 a2=3c a3=0 items=0 ppid=2321 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:10.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530383937353261653764333065633234323564363163623334333465 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit: BPF prog-id=80 op=LOAD Jul 2 01:51:10.099000 audit[2446]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40002318e0 a2=78 a3=0 items=0 ppid=2321 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:10.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530383937353261653764333065633234323564363163623334333465 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit: BPF prog-id=81 op=LOAD Jul 2 01:51:10.099000 audit[2446]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000231670 a2=78 a3=0 items=0 ppid=2321 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:10.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530383937353261653764333065633234323564363163623334333465 Jul 2 01:51:10.099000 audit: BPF prog-id=81 op=UNLOAD Jul 2 01:51:10.099000 audit: BPF prog-id=80 op=UNLOAD Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:10.099000 audit: BPF prog-id=82 op=LOAD Jul 2 01:51:10.099000 audit[2446]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000231b40 a2=78 a3=0 items=0 ppid=2321 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:10.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530383937353261653764333065633234323564363163623334333465 Jul 2 01:51:10.101652 env[1468]: time="2024-07-02T01:51:10.101609196Z" level=info msg="StartContainer for \"4f2c47004adf7044dade1bcb468ba4193f6a2fd34c9e0ad97f5dcd6a75706968\" returns successfully" Jul 2 01:51:10.127028 env[1468]: time="2024-07-02T01:51:10.126984923Z" level=info msg="StartContainer for \"e089752ae7d30ec2425d61cb3434ef2a20a99f87fca26c7de13ddfcae6a894a8\" returns successfully" Jul 2 01:51:11.054498 kubelet[2222]: I0702 01:51:11.054448 2222 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:12.176129 kernel: kauditd_printk_skb: 587 callbacks suppressed Jul 2 01:51:12.176287 kernel: audit: type=1400 audit(1719885072.149:547): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:12.149000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:12.149000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000075080 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:51:12.207969 kernel: audit: type=1300 audit(1719885072.149:547): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000075080 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:51:12.149000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:12.230727 kernel: audit: type=1327 audit(1719885072.149:547): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:12.178000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:12.251268 kernel: audit: type=1400 audit(1719885072.178:548): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:12.178000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000d786e0 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:51:12.278526 kernel: audit: type=1300 audit(1719885072.178:548): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000d786e0 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:51:12.178000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:12.301105 kernel: audit: type=1327 audit(1719885072.178:548): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:12.284000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:12.322375 kernel: audit: type=1400 audit(1719885072.284:549): avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:12.284000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4002f4ae40 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:51:12.354885 kernel: audit: type=1300 audit(1719885072.284:549): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4002f4ae40 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:51:12.284000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:51:12.377472 kernel: audit: type=1327 audit(1719885072.284:549): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:51:12.284000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:12.397660 kernel: audit: type=1400 audit(1719885072.284:550): avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:12.284000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=400446a8c0 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:51:12.284000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:51:12.284000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:12.284000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4002f4b440 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:51:12.284000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:51:12.294000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:12.294000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=49 a1=4002f4b980 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:51:12.294000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:51:12.294000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:12.294000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=4003fea160 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:51:12.294000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:51:12.294000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:12.294000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=4002f79260 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:51:12.294000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:51:12.491791 kubelet[2222]: E0702 01:51:12.491692 2222 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.5-a-6c47a6a388\" not found" node="ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:12.572465 kubelet[2222]: I0702 01:51:12.572425 2222 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:12.922323 kubelet[2222]: I0702 01:51:12.922288 2222 apiserver.go:52] "Watching apiserver" Jul 2 01:51:12.942861 kubelet[2222]: I0702 01:51:12.942795 2222 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 01:51:13.093347 kubelet[2222]: E0702 01:51:13.093320 2222 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.5-a-6c47a6a388\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:13.957377 kubelet[2222]: W0702 01:51:13.957354 2222 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 01:51:15.305935 systemd[1]: Reloading. Jul 2 01:51:15.364736 /usr/lib/systemd/system-generators/torcx-generator[2513]: time="2024-07-02T01:51:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 01:51:15.365095 /usr/lib/systemd/system-generators/torcx-generator[2513]: time="2024-07-02T01:51:15Z" level=info msg="torcx already run" Jul 2 01:51:15.444843 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 01:51:15.444860 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 01:51:15.460951 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 01:51:15.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit: BPF prog-id=83 op=LOAD Jul 2 01:51:15.537000 audit: BPF prog-id=44 op=UNLOAD Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit: BPF prog-id=84 op=LOAD Jul 2 01:51:15.537000 audit: BPF prog-id=45 op=UNLOAD Jul 2 01:51:15.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.538000 audit: BPF prog-id=85 op=LOAD Jul 2 01:51:15.538000 audit: BPF prog-id=59 op=UNLOAD Jul 2 01:51:15.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.539000 audit: BPF prog-id=86 op=LOAD Jul 2 01:51:15.539000 audit: BPF prog-id=46 op=UNLOAD Jul 2 01:51:15.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.540000 audit: BPF prog-id=87 op=LOAD Jul 2 01:51:15.540000 audit: BPF prog-id=63 op=UNLOAD Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit: BPF prog-id=88 op=LOAD Jul 2 01:51:15.541000 audit: BPF prog-id=47 op=UNLOAD Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit: BPF prog-id=89 op=LOAD Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.541000 audit: BPF prog-id=90 op=LOAD Jul 2 01:51:15.541000 audit: BPF prog-id=48 op=UNLOAD Jul 2 01:51:15.541000 audit: BPF prog-id=49 op=UNLOAD Jul 2 01:51:15.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit: BPF prog-id=91 op=LOAD Jul 2 01:51:15.543000 audit: BPF prog-id=71 op=UNLOAD Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit: BPF prog-id=92 op=LOAD Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit: BPF prog-id=93 op=LOAD Jul 2 01:51:15.543000 audit: BPF prog-id=50 op=UNLOAD Jul 2 01:51:15.543000 audit: BPF prog-id=51 op=UNLOAD Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit: BPF prog-id=94 op=LOAD Jul 2 01:51:15.544000 audit: BPF prog-id=52 op=UNLOAD Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit: BPF prog-id=95 op=LOAD Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit: BPF prog-id=96 op=LOAD Jul 2 01:51:15.544000 audit: BPF prog-id=53 op=UNLOAD Jul 2 01:51:15.544000 audit: BPF prog-id=54 op=UNLOAD Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.544000 audit: BPF prog-id=97 op=LOAD Jul 2 01:51:15.544000 audit: BPF prog-id=75 op=UNLOAD Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit: BPF prog-id=98 op=LOAD Jul 2 01:51:15.545000 audit: BPF prog-id=55 op=UNLOAD Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit: BPF prog-id=99 op=LOAD Jul 2 01:51:15.545000 audit: BPF prog-id=56 op=UNLOAD Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit: BPF prog-id=100 op=LOAD Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.545000 audit: BPF prog-id=101 op=LOAD Jul 2 01:51:15.545000 audit: BPF prog-id=57 op=UNLOAD Jul 2 01:51:15.545000 audit: BPF prog-id=58 op=UNLOAD Jul 2 01:51:15.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.547000 audit: BPF prog-id=102 op=LOAD Jul 2 01:51:15.547000 audit: BPF prog-id=67 op=UNLOAD Jul 2 01:51:15.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.547000 audit: BPF prog-id=103 op=LOAD Jul 2 01:51:15.547000 audit: BPF prog-id=79 op=UNLOAD Jul 2 01:51:15.561501 systemd[1]: Stopping kubelet.service... Jul 2 01:51:15.581163 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 01:51:15.581476 systemd[1]: Stopped kubelet.service. Jul 2 01:51:15.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:15.581703 systemd[1]: kubelet.service: Consumed 1.545s CPU time. Jul 2 01:51:15.583832 systemd[1]: Starting kubelet.service... Jul 2 01:51:15.738244 systemd[1]: Started kubelet.service. Jul 2 01:51:15.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:15.796303 kubelet[2577]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 01:51:15.796303 kubelet[2577]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 01:51:15.796303 kubelet[2577]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 01:51:15.796303 kubelet[2577]: I0702 01:51:15.796168 2577 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 01:51:15.800651 kubelet[2577]: I0702 01:51:15.800625 2577 server.go:467] "Kubelet version" kubeletVersion="v1.28.7" Jul 2 01:51:15.800651 kubelet[2577]: I0702 01:51:15.800648 2577 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 01:51:15.800869 kubelet[2577]: I0702 01:51:15.800798 2577 server.go:895] "Client rotation is on, will bootstrap in background" Jul 2 01:51:15.802307 kubelet[2577]: I0702 01:51:15.802282 2577 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 2 01:51:15.803484 kubelet[2577]: I0702 01:51:15.803466 2577 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 01:51:15.810427 kubelet[2577]: W0702 01:51:15.810409 2577 machine.go:65] Cannot read vendor id correctly, set empty. Jul 2 01:51:15.811190 kubelet[2577]: I0702 01:51:15.811176 2577 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 01:51:15.811479 kubelet[2577]: I0702 01:51:15.811467 2577 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 01:51:15.811719 kubelet[2577]: I0702 01:51:15.811704 2577 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 01:51:15.811908 kubelet[2577]: I0702 01:51:15.811894 2577 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 01:51:15.811983 kubelet[2577]: I0702 01:51:15.811973 2577 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 01:51:15.812074 kubelet[2577]: I0702 01:51:15.812064 2577 state_mem.go:36] "Initialized new in-memory state store" Jul 2 01:51:15.812245 kubelet[2577]: I0702 01:51:15.812234 2577 kubelet.go:393] "Attempting to sync node with API server" Jul 2 01:51:15.812320 kubelet[2577]: I0702 01:51:15.812310 2577 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 01:51:15.812392 kubelet[2577]: I0702 01:51:15.812383 2577 kubelet.go:309] "Adding apiserver pod source" Jul 2 01:51:15.812458 kubelet[2577]: I0702 01:51:15.812450 2577 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 01:51:15.813992 kubelet[2577]: I0702 01:51:15.813922 2577 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 01:51:15.814514 kubelet[2577]: I0702 01:51:15.814498 2577 server.go:1232] "Started kubelet" Jul 2 01:51:15.819000 audit[2577]: AVC avc: denied { mac_admin } for pid=2577 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.819000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:51:15.819000 audit[2577]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000888720 a1=400073fcb0 a2=40008886f0 a3=25 items=0 ppid=1 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:15.819000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:51:15.819000 audit[2577]: AVC avc: denied { mac_admin } for pid=2577 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.819000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:51:15.819000 audit[2577]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008c0020 a1=400073fcc8 a2=40008887b0 a3=25 items=0 ppid=1 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:15.819000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:51:15.824144 kubelet[2577]: I0702 01:51:15.819950 2577 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 01:51:15.824144 kubelet[2577]: I0702 01:51:15.820011 2577 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 01:51:15.824144 kubelet[2577]: I0702 01:51:15.820040 2577 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 01:51:15.825914 kubelet[2577]: I0702 01:51:15.825890 2577 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 01:51:15.826001 kubelet[2577]: I0702 01:51:15.825898 2577 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 01:51:15.827005 kubelet[2577]: I0702 01:51:15.826985 2577 server.go:462] "Adding debug handlers to kubelet server" Jul 2 01:51:15.827779 kubelet[2577]: I0702 01:51:15.827736 2577 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 01:51:15.827902 kubelet[2577]: I0702 01:51:15.827885 2577 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 01:51:15.828166 kubelet[2577]: I0702 01:51:15.828151 2577 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Jul 2 01:51:15.828376 kubelet[2577]: I0702 01:51:15.828362 2577 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 01:51:15.833077 kubelet[2577]: I0702 01:51:15.829818 2577 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 01:51:15.833077 kubelet[2577]: I0702 01:51:15.830567 2577 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 01:51:15.833077 kubelet[2577]: I0702 01:51:15.830587 2577 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 01:51:15.833077 kubelet[2577]: I0702 01:51:15.830601 2577 kubelet.go:2303] "Starting kubelet main sync loop" Jul 2 01:51:15.833077 kubelet[2577]: E0702 01:51:15.830644 2577 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 01:51:15.840345 kubelet[2577]: E0702 01:51:15.840322 2577 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Jul 2 01:51:15.840345 kubelet[2577]: E0702 01:51:15.840349 2577 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 01:51:15.919613 kubelet[2577]: I0702 01:51:15.919587 2577 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 01:51:15.919613 kubelet[2577]: I0702 01:51:15.919608 2577 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 01:51:15.919749 kubelet[2577]: I0702 01:51:15.919625 2577 state_mem.go:36] "Initialized new in-memory state store" Jul 2 01:51:15.919827 kubelet[2577]: I0702 01:51:15.919798 2577 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 2 01:51:15.919865 kubelet[2577]: I0702 01:51:15.919839 2577 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 2 01:51:15.919865 kubelet[2577]: I0702 01:51:15.919846 2577 policy_none.go:49] "None policy: Start" Jul 2 01:51:15.920434 kubelet[2577]: I0702 01:51:15.920413 2577 memory_manager.go:169] "Starting memorymanager" policy="None" Jul 2 01:51:15.920477 kubelet[2577]: I0702 01:51:15.920443 2577 state_mem.go:35] "Initializing new in-memory state store" Jul 2 01:51:15.920626 kubelet[2577]: I0702 01:51:15.920607 2577 state_mem.go:75] "Updated machine memory state" Jul 2 01:51:15.924023 kubelet[2577]: I0702 01:51:15.923999 2577 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 01:51:15.923000 audit[2577]: AVC avc: denied { mac_admin } for pid=2577 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.923000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:51:15.923000 audit[2577]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e78870 a1=4000dbc360 a2=4000e78840 a3=25 items=0 ppid=1 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:15.923000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:51:15.924280 kubelet[2577]: I0702 01:51:15.924089 2577 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 01:51:15.924280 kubelet[2577]: I0702 01:51:15.924272 2577 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 01:51:15.930879 kubelet[2577]: I0702 01:51:15.930852 2577 topology_manager.go:215] "Topology Admit Handler" podUID="3d1954c9b8bafe1eb6795fb6a24b2857" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:15.930972 kubelet[2577]: I0702 01:51:15.930955 2577 topology_manager.go:215] "Topology Admit Handler" podUID="14c1190f99450c826486fbda5bc13c7c" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:15.931023 kubelet[2577]: I0702 01:51:15.931004 2577 topology_manager.go:215] "Topology Admit Handler" podUID="3e7c0049ff33f250898f55ff34f277c4" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:15.932401 kubelet[2577]: I0702 01:51:15.932377 2577 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:15.941134 kubelet[2577]: W0702 01:51:15.941106 2577 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 01:51:15.955064 kubelet[2577]: W0702 01:51:15.955029 2577 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 01:51:15.955178 kubelet[2577]: E0702 01:51:15.955095 2577 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.5-a-6c47a6a388\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:15.955408 kubelet[2577]: W0702 01:51:15.955393 2577 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 01:51:15.959439 kubelet[2577]: I0702 01:51:15.959417 2577 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:15.959586 kubelet[2577]: I0702 01:51:15.959576 2577 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:16.029634 kubelet[2577]: I0702 01:51:16.029600 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3d1954c9b8bafe1eb6795fb6a24b2857-ca-certs\") pod \"kube-apiserver-ci-3510.3.5-a-6c47a6a388\" (UID: \"3d1954c9b8bafe1eb6795fb6a24b2857\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:16.029634 kubelet[2577]: I0702 01:51:16.029644 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3d1954c9b8bafe1eb6795fb6a24b2857-k8s-certs\") pod \"kube-apiserver-ci-3510.3.5-a-6c47a6a388\" (UID: \"3d1954c9b8bafe1eb6795fb6a24b2857\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:16.029822 kubelet[2577]: I0702 01:51:16.029676 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3d1954c9b8bafe1eb6795fb6a24b2857-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.5-a-6c47a6a388\" (UID: \"3d1954c9b8bafe1eb6795fb6a24b2857\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:16.029822 kubelet[2577]: I0702 01:51:16.029699 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/14c1190f99450c826486fbda5bc13c7c-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.5-a-6c47a6a388\" (UID: \"14c1190f99450c826486fbda5bc13c7c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:16.029822 kubelet[2577]: I0702 01:51:16.029718 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/14c1190f99450c826486fbda5bc13c7c-ca-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-6c47a6a388\" (UID: \"14c1190f99450c826486fbda5bc13c7c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:16.029822 kubelet[2577]: I0702 01:51:16.029744 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/14c1190f99450c826486fbda5bc13c7c-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.5-a-6c47a6a388\" (UID: \"14c1190f99450c826486fbda5bc13c7c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:16.029822 kubelet[2577]: I0702 01:51:16.029774 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/14c1190f99450c826486fbda5bc13c7c-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-6c47a6a388\" (UID: \"14c1190f99450c826486fbda5bc13c7c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:16.029945 kubelet[2577]: I0702 01:51:16.029794 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/14c1190f99450c826486fbda5bc13c7c-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.5-a-6c47a6a388\" (UID: \"14c1190f99450c826486fbda5bc13c7c\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:16.029945 kubelet[2577]: I0702 01:51:16.029909 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3e7c0049ff33f250898f55ff34f277c4-kubeconfig\") pod \"kube-scheduler-ci-3510.3.5-a-6c47a6a388\" (UID: \"3e7c0049ff33f250898f55ff34f277c4\") " pod="kube-system/kube-scheduler-ci-3510.3.5-a-6c47a6a388" Jul 2 01:51:16.813204 kubelet[2577]: I0702 01:51:16.813171 2577 apiserver.go:52] "Watching apiserver" Jul 2 01:51:16.828053 kubelet[2577]: I0702 01:51:16.828014 2577 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 01:51:16.922285 kubelet[2577]: I0702 01:51:16.922246 2577 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.5-a-6c47a6a388" podStartSLOduration=1.922180275 podCreationTimestamp="2024-07-02 01:51:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 01:51:16.914457353 +0000 UTC m=+1.170112916" watchObservedRunningTime="2024-07-02 01:51:16.922180275 +0000 UTC m=+1.177835838" Jul 2 01:51:16.930519 kubelet[2577]: I0702 01:51:16.930492 2577 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.5-a-6c47a6a388" podStartSLOduration=1.930441759 podCreationTimestamp="2024-07-02 01:51:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 01:51:16.922575066 +0000 UTC m=+1.178230629" watchObservedRunningTime="2024-07-02 01:51:16.930441759 +0000 UTC m=+1.186097282" Jul 2 01:51:16.930615 kubelet[2577]: I0702 01:51:16.930571 2577 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.5-a-6c47a6a388" podStartSLOduration=3.9305571280000002 podCreationTimestamp="2024-07-02 01:51:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 01:51:16.92994588 +0000 UTC m=+1.185601443" watchObservedRunningTime="2024-07-02 01:51:16.930557128 +0000 UTC m=+1.186212691" Jul 2 01:51:17.052000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:17.052000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000b98760 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:51:17.052000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:17.054000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:17.054000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000b98920 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:51:17.054000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:17.055000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:17.055000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000b98ae0 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:51:17.055000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:17.056000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:17.056000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000c014e0 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:51:17.056000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:19.450893 sudo[1882]: pam_unix(sudo:session): session closed for user root Jul 2 01:51:19.449000 audit[1882]: USER_END pid=1882 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:51:19.455910 kernel: kauditd_printk_skb: 284 callbacks suppressed Jul 2 01:51:19.456012 kernel: audit: type=1106 audit(1719885079.449:808): pid=1882 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:51:19.451000 audit[1882]: CRED_DISP pid=1882 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:51:19.496124 kernel: audit: type=1104 audit(1719885079.451:809): pid=1882 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:51:19.540038 sshd[1879]: pam_unix(sshd:session): session closed for user core Jul 2 01:51:19.539000 audit[1879]: USER_END pid=1879 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:51:19.543175 systemd[1]: sshd@6-10.200.20.4:22-10.200.16.10:48914.service: Deactivated successfully. Jul 2 01:51:19.543960 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 01:51:19.544122 systemd[1]: session-9.scope: Consumed 6.527s CPU time. Jul 2 01:51:19.545016 systemd-logind[1435]: Session 9 logged out. Waiting for processes to exit. Jul 2 01:51:19.545763 systemd-logind[1435]: Removed session 9. Jul 2 01:51:19.539000 audit[1879]: CRED_DISP pid=1879 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:51:19.588556 kernel: audit: type=1106 audit(1719885079.539:810): pid=1879 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:51:19.588644 kernel: audit: type=1104 audit(1719885079.539:811): pid=1879 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:51:19.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.4:22-10.200.16.10:48914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:19.609828 kernel: audit: type=1131 audit(1719885079.541:812): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.4:22-10.200.16.10:48914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:27.436000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521028 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 01:51:27.436000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000d0d4c0 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:51:27.487149 kernel: audit: type=1400 audit(1719885087.436:813): avc: denied { watch } for pid=2434 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521028 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 01:51:27.487274 kernel: audit: type=1300 audit(1719885087.436:813): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000d0d4c0 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:51:27.436000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:27.509899 kernel: audit: type=1327 audit(1719885087.436:813): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:29.461133 kubelet[2577]: I0702 01:51:29.461100 2577 kuberuntime_manager.go:1528] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 2 01:51:29.461690 env[1468]: time="2024-07-02T01:51:29.461657341Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 01:51:29.462177 kubelet[2577]: I0702 01:51:29.462155 2577 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 2 01:51:30.152857 kubelet[2577]: I0702 01:51:30.152828 2577 topology_manager.go:215] "Topology Admit Handler" podUID="89ecf669-f803-4899-ae1b-fd6c8a0a0bfa" podNamespace="tigera-operator" podName="tigera-operator-76c4974c85-7k8s9" Jul 2 01:51:30.157642 systemd[1]: Created slice kubepods-besteffort-pod89ecf669_f803_4899_ae1b_fd6c8a0a0bfa.slice. Jul 2 01:51:30.233880 kubelet[2577]: I0702 01:51:30.233841 2577 topology_manager.go:215] "Topology Admit Handler" podUID="bc3d9cec-e90f-4487-9d12-daf164c15009" podNamespace="kube-system" podName="kube-proxy-94n54" Jul 2 01:51:30.238507 systemd[1]: Created slice kubepods-besteffort-podbc3d9cec_e90f_4487_9d12_daf164c15009.slice. Jul 2 01:51:30.304352 kubelet[2577]: I0702 01:51:30.304307 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/bc3d9cec-e90f-4487-9d12-daf164c15009-lib-modules\") pod \"kube-proxy-94n54\" (UID: \"bc3d9cec-e90f-4487-9d12-daf164c15009\") " pod="kube-system/kube-proxy-94n54" Jul 2 01:51:30.304352 kubelet[2577]: I0702 01:51:30.304351 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/bc3d9cec-e90f-4487-9d12-daf164c15009-xtables-lock\") pod \"kube-proxy-94n54\" (UID: \"bc3d9cec-e90f-4487-9d12-daf164c15009\") " pod="kube-system/kube-proxy-94n54" Jul 2 01:51:30.304530 kubelet[2577]: I0702 01:51:30.304396 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/89ecf669-f803-4899-ae1b-fd6c8a0a0bfa-var-lib-calico\") pod \"tigera-operator-76c4974c85-7k8s9\" (UID: \"89ecf669-f803-4899-ae1b-fd6c8a0a0bfa\") " pod="tigera-operator/tigera-operator-76c4974c85-7k8s9" Jul 2 01:51:30.304530 kubelet[2577]: I0702 01:51:30.304419 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8qmbt\" (UniqueName: \"kubernetes.io/projected/89ecf669-f803-4899-ae1b-fd6c8a0a0bfa-kube-api-access-8qmbt\") pod \"tigera-operator-76c4974c85-7k8s9\" (UID: \"89ecf669-f803-4899-ae1b-fd6c8a0a0bfa\") " pod="tigera-operator/tigera-operator-76c4974c85-7k8s9" Jul 2 01:51:30.304530 kubelet[2577]: I0702 01:51:30.304472 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/bc3d9cec-e90f-4487-9d12-daf164c15009-kube-proxy\") pod \"kube-proxy-94n54\" (UID: \"bc3d9cec-e90f-4487-9d12-daf164c15009\") " pod="kube-system/kube-proxy-94n54" Jul 2 01:51:30.304530 kubelet[2577]: I0702 01:51:30.304491 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xc9hf\" (UniqueName: \"kubernetes.io/projected/bc3d9cec-e90f-4487-9d12-daf164c15009-kube-api-access-xc9hf\") pod \"kube-proxy-94n54\" (UID: \"bc3d9cec-e90f-4487-9d12-daf164c15009\") " pod="kube-system/kube-proxy-94n54" Jul 2 01:51:30.464348 env[1468]: time="2024-07-02T01:51:30.463955048Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4974c85-7k8s9,Uid:89ecf669-f803-4899-ae1b-fd6c8a0a0bfa,Namespace:tigera-operator,Attempt:0,}" Jul 2 01:51:30.508925 env[1468]: time="2024-07-02T01:51:30.508852654Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:51:30.509114 env[1468]: time="2024-07-02T01:51:30.509090988Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:51:30.509214 env[1468]: time="2024-07-02T01:51:30.509193834Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:51:30.509467 env[1468]: time="2024-07-02T01:51:30.509439088Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/09e2e4c8b302d293b6d813ed9b5f4010454229ab9639282a1a1943c6685ef334 pid=2658 runtime=io.containerd.runc.v2 Jul 2 01:51:30.526295 systemd[1]: Started cri-containerd-09e2e4c8b302d293b6d813ed9b5f4010454229ab9639282a1a1943c6685ef334.scope. Jul 2 01:51:30.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.576334 kernel: audit: type=1400 audit(1719885090.536:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.576442 kernel: audit: type=1400 audit(1719885090.536:815): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.576470 kernel: audit: type=1400 audit(1719885090.536:816): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.576594 env[1468]: time="2024-07-02T01:51:30.575437661Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-94n54,Uid:bc3d9cec-e90f-4487-9d12-daf164c15009,Namespace:kube-system,Attempt:0,}" Jul 2 01:51:30.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.614202 kernel: audit: type=1400 audit(1719885090.536:817): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.632657 kernel: audit: type=1400 audit(1719885090.536:818): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.649675 kernel: audit: type=1400 audit(1719885090.536:819): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.666432 kernel: audit: type=1400 audit(1719885090.536:820): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.555000 audit: BPF prog-id=104 op=LOAD Jul 2 01:51:30.555000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.555000 audit[2669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2658 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039653265346338623330326432393362366438313365643962356634 Jul 2 01:51:30.555000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.555000 audit[2669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2658 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039653265346338623330326432393362366438313365643962356634 Jul 2 01:51:30.555000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.555000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.555000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.555000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.555000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.555000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.555000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.555000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.555000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.555000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.555000 audit: BPF prog-id=105 op=LOAD Jul 2 01:51:30.555000 audit[2669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2658 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039653265346338623330326432393362366438313365643962356634 Jul 2 01:51:30.575000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.575000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.575000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.575000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.575000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.575000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.575000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.575000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.575000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.575000 audit: BPF prog-id=106 op=LOAD Jul 2 01:51:30.575000 audit[2669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2658 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039653265346338623330326432393362366438313365643962356634 Jul 2 01:51:30.591000 audit: BPF prog-id=106 op=UNLOAD Jul 2 01:51:30.591000 audit: BPF prog-id=105 op=UNLOAD Jul 2 01:51:30.591000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.591000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.591000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.591000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.591000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.591000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.591000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.591000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.591000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.591000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.591000 audit: BPF prog-id=107 op=LOAD Jul 2 01:51:30.591000 audit[2669]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2658 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039653265346338623330326432393362366438313365643962356634 Jul 2 01:51:30.677982 env[1468]: time="2024-07-02T01:51:30.677945801Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4974c85-7k8s9,Uid:89ecf669-f803-4899-ae1b-fd6c8a0a0bfa,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"09e2e4c8b302d293b6d813ed9b5f4010454229ab9639282a1a1943c6685ef334\"" Jul 2 01:51:30.684099 env[1468]: time="2024-07-02T01:51:30.684060391Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\"" Jul 2 01:51:30.702225 env[1468]: time="2024-07-02T01:51:30.702143544Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:51:30.702394 env[1468]: time="2024-07-02T01:51:30.702369557Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:51:30.702478 env[1468]: time="2024-07-02T01:51:30.702457242Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:51:30.702709 env[1468]: time="2024-07-02T01:51:30.702674975Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f61f9410d5d972182e1e037e2cfe7e7ef36547530db27343816c91344ea9a9d3 pid=2700 runtime=io.containerd.runc.v2 Jul 2 01:51:30.711793 systemd[1]: Started cri-containerd-f61f9410d5d972182e1e037e2cfe7e7ef36547530db27343816c91344ea9a9d3.scope. Jul 2 01:51:30.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.723000 audit: BPF prog-id=108 op=LOAD Jul 2 01:51:30.725000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.725000 audit[2710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2700 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316639343130643564393732313832653165303337653263666537 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2700 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316639343130643564393732313832653165303337653263666537 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit: BPF prog-id=109 op=LOAD Jul 2 01:51:30.726000 audit[2710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2700 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316639343130643564393732313832653165303337653263666537 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.726000 audit: BPF prog-id=110 op=LOAD Jul 2 01:51:30.726000 audit[2710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2700 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316639343130643564393732313832653165303337653263666537 Jul 2 01:51:30.727000 audit: BPF prog-id=110 op=UNLOAD Jul 2 01:51:30.727000 audit: BPF prog-id=109 op=UNLOAD Jul 2 01:51:30.727000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.727000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.727000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.727000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.727000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.727000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.727000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.727000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.727000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.727000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.727000 audit: BPF prog-id=111 op=LOAD Jul 2 01:51:30.727000 audit[2710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2700 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316639343130643564393732313832653165303337653263666537 Jul 2 01:51:30.740413 env[1468]: time="2024-07-02T01:51:30.740365129Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-94n54,Uid:bc3d9cec-e90f-4487-9d12-daf164c15009,Namespace:kube-system,Attempt:0,} returns sandbox id \"f61f9410d5d972182e1e037e2cfe7e7ef36547530db27343816c91344ea9a9d3\"" Jul 2 01:51:30.745583 env[1468]: time="2024-07-02T01:51:30.745555826Z" level=info msg="CreateContainer within sandbox \"f61f9410d5d972182e1e037e2cfe7e7ef36547530db27343816c91344ea9a9d3\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 01:51:30.791847 env[1468]: time="2024-07-02T01:51:30.791783709Z" level=info msg="CreateContainer within sandbox \"f61f9410d5d972182e1e037e2cfe7e7ef36547530db27343816c91344ea9a9d3\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d6a166d90f0e65c156dee3a7cc64bda196d1a7b38b9d51632f31190ab2696ab9\"" Jul 2 01:51:30.794029 env[1468]: time="2024-07-02T01:51:30.792394384Z" level=info msg="StartContainer for \"d6a166d90f0e65c156dee3a7cc64bda196d1a7b38b9d51632f31190ab2696ab9\"" Jul 2 01:51:30.808289 systemd[1]: Started cri-containerd-d6a166d90f0e65c156dee3a7cc64bda196d1a7b38b9d51632f31190ab2696ab9.scope. Jul 2 01:51:30.822000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.822000 audit[2741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2700 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613136366439306630653635633135366465653361376363363462 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit: BPF prog-id=112 op=LOAD Jul 2 01:51:30.823000 audit[2741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2700 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613136366439306630653635633135366465653361376363363462 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.823000 audit: BPF prog-id=113 op=LOAD Jul 2 01:51:30.823000 audit[2741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2700 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613136366439306630653635633135366465653361376363363462 Jul 2 01:51:30.824000 audit: BPF prog-id=113 op=UNLOAD Jul 2 01:51:30.824000 audit: BPF prog-id=112 op=UNLOAD Jul 2 01:51:30.824000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.824000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.824000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.824000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.824000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.824000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.824000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.824000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.824000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.824000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:30.824000 audit: BPF prog-id=114 op=LOAD Jul 2 01:51:30.824000 audit[2741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2700 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613136366439306630653635633135366465653361376363363462 Jul 2 01:51:30.841839 env[1468]: time="2024-07-02T01:51:30.841774607Z" level=info msg="StartContainer for \"d6a166d90f0e65c156dee3a7cc64bda196d1a7b38b9d51632f31190ab2696ab9\" returns successfully" Jul 2 01:51:30.892000 audit[2796]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:30.892000 audit[2796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffebf57870 a2=0 a3=1 items=0 ppid=2755 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.892000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 01:51:30.893000 audit[2797]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:30.893000 audit[2797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeb2c3010 a2=0 a3=1 items=0 ppid=2755 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.893000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 01:51:30.894000 audit[2798]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:30.894000 audit[2798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc8d63300 a2=0 a3=1 items=0 ppid=2755 pid=2798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.894000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 01:51:30.895000 audit[2799]: NETFILTER_CFG table=mangle:44 family=2 entries=1 op=nft_register_chain pid=2799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:30.895000 audit[2799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd8008c10 a2=0 a3=1 items=0 ppid=2755 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.895000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 01:51:30.897000 audit[2800]: NETFILTER_CFG table=nat:45 family=2 entries=1 op=nft_register_chain pid=2800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:30.897000 audit[2800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdd50aa70 a2=0 a3=1 items=0 ppid=2755 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.897000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 01:51:30.901000 audit[2801]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2801 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:30.901000 audit[2801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcea3aa50 a2=0 a3=1 items=0 ppid=2755 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:30.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 01:51:30.927727 kubelet[2577]: I0702 01:51:30.927694 2577 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-94n54" podStartSLOduration=0.927658557 podCreationTimestamp="2024-07-02 01:51:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 01:51:30.927459425 +0000 UTC m=+15.183114988" watchObservedRunningTime="2024-07-02 01:51:30.927658557 +0000 UTC m=+15.183314120" Jul 2 01:51:31.001000 audit[2802]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.001000 audit[2802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc4968c50 a2=0 a3=1 items=0 ppid=2755 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 01:51:31.005000 audit[2804]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.005000 audit[2804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdc5f5a80 a2=0 a3=1 items=0 ppid=2755 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 01:51:31.010000 audit[2807]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.010000 audit[2807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcc091ea0 a2=0 a3=1 items=0 ppid=2755 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 01:51:31.011000 audit[2808]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.011000 audit[2808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffca86ca20 a2=0 a3=1 items=0 ppid=2755 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 01:51:31.014000 audit[2810]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2810 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.014000 audit[2810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe85faac0 a2=0 a3=1 items=0 ppid=2755 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.014000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 01:51:31.016000 audit[2811]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2811 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.016000 audit[2811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff2b68d10 a2=0 a3=1 items=0 ppid=2755 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 01:51:31.018000 audit[2813]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2813 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.018000 audit[2813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd56c2db0 a2=0 a3=1 items=0 ppid=2755 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 01:51:31.022000 audit[2816]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.022000 audit[2816]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe5109480 a2=0 a3=1 items=0 ppid=2755 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 01:51:31.023000 audit[2817]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2817 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.023000 audit[2817]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe6160be0 a2=0 a3=1 items=0 ppid=2755 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 01:51:31.025000 audit[2819]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.025000 audit[2819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffeb4fcfe0 a2=0 a3=1 items=0 ppid=2755 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 01:51:31.026000 audit[2820]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2820 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.026000 audit[2820]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff71fe950 a2=0 a3=1 items=0 ppid=2755 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.026000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 01:51:31.028000 audit[2822]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2822 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.028000 audit[2822]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffc89fc40 a2=0 a3=1 items=0 ppid=2755 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.028000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 01:51:31.032000 audit[2825]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2825 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.032000 audit[2825]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc3bc55e0 a2=0 a3=1 items=0 ppid=2755 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 01:51:31.035000 audit[2828]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2828 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.035000 audit[2828]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd8ee38e0 a2=0 a3=1 items=0 ppid=2755 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 01:51:31.036000 audit[2829]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2829 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.036000 audit[2829]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd2276470 a2=0 a3=1 items=0 ppid=2755 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.036000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 01:51:31.039000 audit[2831]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2831 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.039000 audit[2831]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffc7751dd0 a2=0 a3=1 items=0 ppid=2755 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.039000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 01:51:31.042000 audit[2834]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2834 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.042000 audit[2834]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc73eea90 a2=0 a3=1 items=0 ppid=2755 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.042000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 01:51:31.043000 audit[2835]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2835 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.043000 audit[2835]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd5ead3a0 a2=0 a3=1 items=0 ppid=2755 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.043000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 01:51:31.046000 audit[2837]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2837 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:31.046000 audit[2837]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffe3aca090 a2=0 a3=1 items=0 ppid=2755 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.046000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 01:51:31.175000 audit[2843]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:31.175000 audit[2843]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffe04b6650 a2=0 a3=1 items=0 ppid=2755 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.175000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:31.217000 audit[2843]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:31.217000 audit[2843]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffe04b6650 a2=0 a3=1 items=0 ppid=2755 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.217000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:31.219000 audit[2848]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2848 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.219000 audit[2848]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffde30f400 a2=0 a3=1 items=0 ppid=2755 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 01:51:31.221000 audit[2850]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.221000 audit[2850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffce451ee0 a2=0 a3=1 items=0 ppid=2755 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.221000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 01:51:31.224000 audit[2853]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2853 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.224000 audit[2853]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe3570320 a2=0 a3=1 items=0 ppid=2755 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.224000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 01:51:31.225000 audit[2854]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2854 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.225000 audit[2854]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffe605070 a2=0 a3=1 items=0 ppid=2755 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 01:51:31.227000 audit[2856]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2856 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.227000 audit[2856]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdf0e0950 a2=0 a3=1 items=0 ppid=2755 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.227000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 01:51:31.228000 audit[2857]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.228000 audit[2857]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe8e40fd0 a2=0 a3=1 items=0 ppid=2755 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 01:51:31.230000 audit[2859]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.230000 audit[2859]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffca9f42c0 a2=0 a3=1 items=0 ppid=2755 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 01:51:31.233000 audit[2862]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2862 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.233000 audit[2862]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffcde8a780 a2=0 a3=1 items=0 ppid=2755 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 01:51:31.234000 audit[2863]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.234000 audit[2863]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffebffe840 a2=0 a3=1 items=0 ppid=2755 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.234000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 01:51:31.236000 audit[2865]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2865 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.236000 audit[2865]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffebf42d70 a2=0 a3=1 items=0 ppid=2755 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 01:51:31.237000 audit[2866]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.237000 audit[2866]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe9adf310 a2=0 a3=1 items=0 ppid=2755 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 01:51:31.240000 audit[2868]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2868 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.240000 audit[2868]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc2326f80 a2=0 a3=1 items=0 ppid=2755 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.240000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 01:51:31.243000 audit[2871]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2871 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.243000 audit[2871]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff2345b00 a2=0 a3=1 items=0 ppid=2755 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.243000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 01:51:31.246000 audit[2874]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.246000 audit[2874]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdb29c9c0 a2=0 a3=1 items=0 ppid=2755 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.246000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 01:51:31.247000 audit[2875]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2875 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.247000 audit[2875]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd6f77db0 a2=0 a3=1 items=0 ppid=2755 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 01:51:31.249000 audit[2877]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2877 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.249000 audit[2877]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe0632900 a2=0 a3=1 items=0 ppid=2755 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 01:51:31.252000 audit[2880]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2880 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.252000 audit[2880]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff2920f90 a2=0 a3=1 items=0 ppid=2755 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 01:51:31.253000 audit[2881]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2881 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.253000 audit[2881]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe1e32b20 a2=0 a3=1 items=0 ppid=2755 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.253000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 01:51:31.255000 audit[2883]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2883 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.255000 audit[2883]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffcaeacc40 a2=0 a3=1 items=0 ppid=2755 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.255000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 01:51:31.256000 audit[2884]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2884 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.256000 audit[2884]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcc7d6d70 a2=0 a3=1 items=0 ppid=2755 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 01:51:31.258000 audit[2886]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2886 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.258000 audit[2886]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffedcc7260 a2=0 a3=1 items=0 ppid=2755 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.258000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 01:51:31.261000 audit[2889]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2889 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:31.261000 audit[2889]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc8b0c4e0 a2=0 a3=1 items=0 ppid=2755 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.261000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 01:51:31.264000 audit[2891]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2891 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 01:51:31.264000 audit[2891]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffd0d91260 a2=0 a3=1 items=0 ppid=2755 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.264000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:31.264000 audit[2891]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2891 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 01:51:31.264000 audit[2891]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffd0d91260 a2=0 a3=1 items=0 ppid=2755 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:31.264000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:32.364465 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1753159435.mount: Deactivated successfully. Jul 2 01:51:32.877582 env[1468]: time="2024-07-02T01:51:32.877539105Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:32.884618 env[1468]: time="2024-07-02T01:51:32.884584251Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5886f48e233edcb89c0e8e3cdbdc40101f3c2dfbe67d7717f01d19c27cd78f92,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:32.887447 env[1468]: time="2024-07-02T01:51:32.887421927Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:32.892624 env[1468]: time="2024-07-02T01:51:32.892580010Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:479ddc7ff9ab095058b96f6710bbf070abada86332e267d6e5dcc1df36ba2cc5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:32.893205 env[1468]: time="2024-07-02T01:51:32.893172963Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\" returns image reference \"sha256:5886f48e233edcb89c0e8e3cdbdc40101f3c2dfbe67d7717f01d19c27cd78f92\"" Jul 2 01:51:32.896729 env[1468]: time="2024-07-02T01:51:32.896703317Z" level=info msg="CreateContainer within sandbox \"09e2e4c8b302d293b6d813ed9b5f4010454229ab9639282a1a1943c6685ef334\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 2 01:51:32.918065 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount694299079.mount: Deactivated successfully. Jul 2 01:51:32.923794 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount623739596.mount: Deactivated successfully. Jul 2 01:51:32.936442 env[1468]: time="2024-07-02T01:51:32.936392575Z" level=info msg="CreateContainer within sandbox \"09e2e4c8b302d293b6d813ed9b5f4010454229ab9639282a1a1943c6685ef334\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"034c789b2cb40fed6d48767b8cf7a7daabb61729dad6bb3dcd06ce84400d4cb6\"" Jul 2 01:51:32.937010 env[1468]: time="2024-07-02T01:51:32.936958726Z" level=info msg="StartContainer for \"034c789b2cb40fed6d48767b8cf7a7daabb61729dad6bb3dcd06ce84400d4cb6\"" Jul 2 01:51:32.957486 systemd[1]: Started cri-containerd-034c789b2cb40fed6d48767b8cf7a7daabb61729dad6bb3dcd06ce84400d4cb6.scope. Jul 2 01:51:32.973862 kernel: kauditd_printk_skb: 303 callbacks suppressed Jul 2 01:51:32.973979 kernel: audit: type=1400 audit(1719885092.967:907): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.006448 kernel: audit: type=1400 audit(1719885092.968:908): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.006543 kernel: audit: type=1400 audit(1719885092.968:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.023003 kernel: audit: type=1400 audit(1719885092.968:910): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.056031 kernel: audit: type=1400 audit(1719885092.968:911): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.056111 kernel: audit: type=1400 audit(1719885092.968:912): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.089177 kernel: audit: type=1400 audit(1719885092.968:913): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.105796 kernel: audit: type=1400 audit(1719885092.968:914): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.123624 kernel: audit: type=1400 audit(1719885092.968:915): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.140542 kernel: audit: type=1400 audit(1719885092.973:916): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.973000 audit: BPF prog-id=115 op=LOAD Jul 2 01:51:32.989000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.989000 audit[2900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2658 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:32.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346337383962326362343066656436643438373637623863663761 Jul 2 01:51:32.990000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.990000 audit[2900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2658 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:32.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346337383962326362343066656436643438373637623863663761 Jul 2 01:51:32.990000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.990000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.990000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.990000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.990000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.990000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.990000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.990000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.990000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.990000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:32.990000 audit: BPF prog-id=116 op=LOAD Jul 2 01:51:32.990000 audit[2900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2658 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:32.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346337383962326362343066656436643438373637623863663761 Jul 2 01:51:33.006000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.006000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.006000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.006000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.006000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.006000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.006000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.006000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.006000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.006000 audit: BPF prog-id=117 op=LOAD Jul 2 01:51:33.006000 audit[2900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2658 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:33.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346337383962326362343066656436643438373637623863663761 Jul 2 01:51:33.022000 audit: BPF prog-id=117 op=UNLOAD Jul 2 01:51:33.022000 audit: BPF prog-id=116 op=UNLOAD Jul 2 01:51:33.022000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.022000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.022000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.022000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.022000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.022000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.022000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.022000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.022000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.022000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:33.022000 audit: BPF prog-id=118 op=LOAD Jul 2 01:51:33.022000 audit[2900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2658 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:33.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346337383962326362343066656436643438373637623863663761 Jul 2 01:51:33.149989 env[1468]: time="2024-07-02T01:51:33.149942052Z" level=info msg="StartContainer for \"034c789b2cb40fed6d48767b8cf7a7daabb61729dad6bb3dcd06ce84400d4cb6\" returns successfully" Jul 2 01:51:33.937761 kubelet[2577]: I0702 01:51:33.937730 2577 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4974c85-7k8s9" podStartSLOduration=1.7241881239999999 podCreationTimestamp="2024-07-02 01:51:30 +0000 UTC" firstStartedPulling="2024-07-02 01:51:30.679960116 +0000 UTC m=+14.935615679" lastFinishedPulling="2024-07-02 01:51:32.893465299 +0000 UTC m=+17.149120862" observedRunningTime="2024-07-02 01:51:33.934784271 +0000 UTC m=+18.190439794" watchObservedRunningTime="2024-07-02 01:51:33.937693307 +0000 UTC m=+18.193348870" Jul 2 01:51:37.424000 audit[2934]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:37.424000 audit[2934]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffffcd7b550 a2=0 a3=1 items=0 ppid=2755 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:37.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:37.425000 audit[2934]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:37.425000 audit[2934]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffffcd7b550 a2=0 a3=1 items=0 ppid=2755 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:37.425000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:37.435000 audit[2936]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:37.435000 audit[2936]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff9644c20 a2=0 a3=1 items=0 ppid=2755 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:37.435000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:37.436000 audit[2936]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:37.436000 audit[2936]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff9644c20 a2=0 a3=1 items=0 ppid=2755 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:37.436000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:37.554340 kubelet[2577]: I0702 01:51:37.554293 2577 topology_manager.go:215] "Topology Admit Handler" podUID="da6c9db2-4ca1-4b68-a465-54fc748a98b1" podNamespace="calico-system" podName="calico-typha-7649d9d57c-vb5fb" Jul 2 01:51:37.559145 systemd[1]: Created slice kubepods-besteffort-podda6c9db2_4ca1_4b68_a465_54fc748a98b1.slice. Jul 2 01:51:37.660741 kubelet[2577]: I0702 01:51:37.660686 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/da6c9db2-4ca1-4b68-a465-54fc748a98b1-tigera-ca-bundle\") pod \"calico-typha-7649d9d57c-vb5fb\" (UID: \"da6c9db2-4ca1-4b68-a465-54fc748a98b1\") " pod="calico-system/calico-typha-7649d9d57c-vb5fb" Jul 2 01:51:37.660741 kubelet[2577]: I0702 01:51:37.660751 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qlfrn\" (UniqueName: \"kubernetes.io/projected/da6c9db2-4ca1-4b68-a465-54fc748a98b1-kube-api-access-qlfrn\") pod \"calico-typha-7649d9d57c-vb5fb\" (UID: \"da6c9db2-4ca1-4b68-a465-54fc748a98b1\") " pod="calico-system/calico-typha-7649d9d57c-vb5fb" Jul 2 01:51:37.660949 kubelet[2577]: I0702 01:51:37.660775 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/da6c9db2-4ca1-4b68-a465-54fc748a98b1-typha-certs\") pod \"calico-typha-7649d9d57c-vb5fb\" (UID: \"da6c9db2-4ca1-4b68-a465-54fc748a98b1\") " pod="calico-system/calico-typha-7649d9d57c-vb5fb" Jul 2 01:51:37.697189 kubelet[2577]: I0702 01:51:37.697074 2577 topology_manager.go:215] "Topology Admit Handler" podUID="03d479e1-4fd2-4d86-91cc-51282e6bdfea" podNamespace="calico-system" podName="calico-node-n8lm8" Jul 2 01:51:37.707041 systemd[1]: Created slice kubepods-besteffort-pod03d479e1_4fd2_4d86_91cc_51282e6bdfea.slice. Jul 2 01:51:37.761791 kubelet[2577]: I0702 01:51:37.761754 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/03d479e1-4fd2-4d86-91cc-51282e6bdfea-lib-modules\") pod \"calico-node-n8lm8\" (UID: \"03d479e1-4fd2-4d86-91cc-51282e6bdfea\") " pod="calico-system/calico-node-n8lm8" Jul 2 01:51:37.761791 kubelet[2577]: I0702 01:51:37.761798 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/03d479e1-4fd2-4d86-91cc-51282e6bdfea-cni-net-dir\") pod \"calico-node-n8lm8\" (UID: \"03d479e1-4fd2-4d86-91cc-51282e6bdfea\") " pod="calico-system/calico-node-n8lm8" Jul 2 01:51:37.761986 kubelet[2577]: I0702 01:51:37.761839 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/03d479e1-4fd2-4d86-91cc-51282e6bdfea-node-certs\") pod \"calico-node-n8lm8\" (UID: \"03d479e1-4fd2-4d86-91cc-51282e6bdfea\") " pod="calico-system/calico-node-n8lm8" Jul 2 01:51:37.761986 kubelet[2577]: I0702 01:51:37.761858 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/03d479e1-4fd2-4d86-91cc-51282e6bdfea-policysync\") pod \"calico-node-n8lm8\" (UID: \"03d479e1-4fd2-4d86-91cc-51282e6bdfea\") " pod="calico-system/calico-node-n8lm8" Jul 2 01:51:37.761986 kubelet[2577]: I0702 01:51:37.761877 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/03d479e1-4fd2-4d86-91cc-51282e6bdfea-cni-bin-dir\") pod \"calico-node-n8lm8\" (UID: \"03d479e1-4fd2-4d86-91cc-51282e6bdfea\") " pod="calico-system/calico-node-n8lm8" Jul 2 01:51:37.761986 kubelet[2577]: I0702 01:51:37.761897 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/03d479e1-4fd2-4d86-91cc-51282e6bdfea-flexvol-driver-host\") pod \"calico-node-n8lm8\" (UID: \"03d479e1-4fd2-4d86-91cc-51282e6bdfea\") " pod="calico-system/calico-node-n8lm8" Jul 2 01:51:37.761986 kubelet[2577]: I0702 01:51:37.761929 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/03d479e1-4fd2-4d86-91cc-51282e6bdfea-cni-log-dir\") pod \"calico-node-n8lm8\" (UID: \"03d479e1-4fd2-4d86-91cc-51282e6bdfea\") " pod="calico-system/calico-node-n8lm8" Jul 2 01:51:37.762111 kubelet[2577]: I0702 01:51:37.761946 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/03d479e1-4fd2-4d86-91cc-51282e6bdfea-var-lib-calico\") pod \"calico-node-n8lm8\" (UID: \"03d479e1-4fd2-4d86-91cc-51282e6bdfea\") " pod="calico-system/calico-node-n8lm8" Jul 2 01:51:37.762111 kubelet[2577]: I0702 01:51:37.761965 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sffqw\" (UniqueName: \"kubernetes.io/projected/03d479e1-4fd2-4d86-91cc-51282e6bdfea-kube-api-access-sffqw\") pod \"calico-node-n8lm8\" (UID: \"03d479e1-4fd2-4d86-91cc-51282e6bdfea\") " pod="calico-system/calico-node-n8lm8" Jul 2 01:51:37.762111 kubelet[2577]: I0702 01:51:37.761996 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/03d479e1-4fd2-4d86-91cc-51282e6bdfea-tigera-ca-bundle\") pod \"calico-node-n8lm8\" (UID: \"03d479e1-4fd2-4d86-91cc-51282e6bdfea\") " pod="calico-system/calico-node-n8lm8" Jul 2 01:51:37.762111 kubelet[2577]: I0702 01:51:37.762016 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/03d479e1-4fd2-4d86-91cc-51282e6bdfea-xtables-lock\") pod \"calico-node-n8lm8\" (UID: \"03d479e1-4fd2-4d86-91cc-51282e6bdfea\") " pod="calico-system/calico-node-n8lm8" Jul 2 01:51:37.762111 kubelet[2577]: I0702 01:51:37.762035 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/03d479e1-4fd2-4d86-91cc-51282e6bdfea-var-run-calico\") pod \"calico-node-n8lm8\" (UID: \"03d479e1-4fd2-4d86-91cc-51282e6bdfea\") " pod="calico-system/calico-node-n8lm8" Jul 2 01:51:37.826370 kubelet[2577]: I0702 01:51:37.826333 2577 topology_manager.go:215] "Topology Admit Handler" podUID="0a1ebfc4-789b-4005-bedf-61c880e9e47c" podNamespace="calico-system" podName="csi-node-driver-x8j4l" Jul 2 01:51:37.826904 kubelet[2577]: E0702 01:51:37.826882 2577 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x8j4l" podUID="0a1ebfc4-789b-4005-bedf-61c880e9e47c" Jul 2 01:51:37.862043 env[1468]: time="2024-07-02T01:51:37.861992374Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7649d9d57c-vb5fb,Uid:da6c9db2-4ca1-4b68-a465-54fc748a98b1,Namespace:calico-system,Attempt:0,}" Jul 2 01:51:37.862629 kubelet[2577]: I0702 01:51:37.862602 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/0a1ebfc4-789b-4005-bedf-61c880e9e47c-varrun\") pod \"csi-node-driver-x8j4l\" (UID: \"0a1ebfc4-789b-4005-bedf-61c880e9e47c\") " pod="calico-system/csi-node-driver-x8j4l" Jul 2 01:51:37.862730 kubelet[2577]: I0702 01:51:37.862716 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/0a1ebfc4-789b-4005-bedf-61c880e9e47c-socket-dir\") pod \"csi-node-driver-x8j4l\" (UID: \"0a1ebfc4-789b-4005-bedf-61c880e9e47c\") " pod="calico-system/csi-node-driver-x8j4l" Jul 2 01:51:37.862769 kubelet[2577]: I0702 01:51:37.862742 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/0a1ebfc4-789b-4005-bedf-61c880e9e47c-registration-dir\") pod \"csi-node-driver-x8j4l\" (UID: \"0a1ebfc4-789b-4005-bedf-61c880e9e47c\") " pod="calico-system/csi-node-driver-x8j4l" Jul 2 01:51:37.862823 kubelet[2577]: I0702 01:51:37.862774 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qdrsz\" (UniqueName: \"kubernetes.io/projected/0a1ebfc4-789b-4005-bedf-61c880e9e47c-kube-api-access-qdrsz\") pod \"csi-node-driver-x8j4l\" (UID: \"0a1ebfc4-789b-4005-bedf-61c880e9e47c\") " pod="calico-system/csi-node-driver-x8j4l" Jul 2 01:51:37.862823 kubelet[2577]: I0702 01:51:37.862796 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/0a1ebfc4-789b-4005-bedf-61c880e9e47c-kubelet-dir\") pod \"csi-node-driver-x8j4l\" (UID: \"0a1ebfc4-789b-4005-bedf-61c880e9e47c\") " pod="calico-system/csi-node-driver-x8j4l" Jul 2 01:51:37.864194 kubelet[2577]: E0702 01:51:37.864175 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.864322 kubelet[2577]: W0702 01:51:37.864306 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.864416 kubelet[2577]: E0702 01:51:37.864406 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.871976 kubelet[2577]: E0702 01:51:37.871957 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.872204 kubelet[2577]: W0702 01:51:37.872181 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.872323 kubelet[2577]: E0702 01:51:37.872300 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.872590 kubelet[2577]: E0702 01:51:37.872573 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.872700 kubelet[2577]: W0702 01:51:37.872687 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.872818 kubelet[2577]: E0702 01:51:37.872792 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.873086 kubelet[2577]: E0702 01:51:37.873071 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.873181 kubelet[2577]: W0702 01:51:37.873167 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.873442 kubelet[2577]: E0702 01:51:37.873429 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.873549 kubelet[2577]: W0702 01:51:37.873535 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.873646 kubelet[2577]: E0702 01:51:37.873626 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.873702 kubelet[2577]: E0702 01:51:37.873673 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.873943 kubelet[2577]: E0702 01:51:37.873929 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.874025 kubelet[2577]: W0702 01:51:37.874013 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.874245 kubelet[2577]: E0702 01:51:37.874222 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.874389 kubelet[2577]: E0702 01:51:37.874335 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.874470 kubelet[2577]: W0702 01:51:37.874448 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.874569 kubelet[2577]: E0702 01:51:37.874551 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.875986 kubelet[2577]: E0702 01:51:37.875958 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.876103 kubelet[2577]: W0702 01:51:37.876087 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.876262 kubelet[2577]: E0702 01:51:37.876251 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.876500 kubelet[2577]: E0702 01:51:37.876489 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.876591 kubelet[2577]: W0702 01:51:37.876579 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.876712 kubelet[2577]: E0702 01:51:37.876692 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.876969 kubelet[2577]: E0702 01:51:37.876954 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.877075 kubelet[2577]: W0702 01:51:37.877062 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.877187 kubelet[2577]: E0702 01:51:37.877167 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.877425 kubelet[2577]: E0702 01:51:37.877409 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.877519 kubelet[2577]: W0702 01:51:37.877506 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.877826 kubelet[2577]: E0702 01:51:37.877688 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.877959 kubelet[2577]: E0702 01:51:37.877944 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.878040 kubelet[2577]: W0702 01:51:37.878028 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.878120 kubelet[2577]: E0702 01:51:37.878111 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.878992 kubelet[2577]: E0702 01:51:37.878967 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.879081 kubelet[2577]: W0702 01:51:37.879069 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.879247 kubelet[2577]: E0702 01:51:37.879237 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.879541 kubelet[2577]: E0702 01:51:37.879528 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.879635 kubelet[2577]: W0702 01:51:37.879623 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.879758 kubelet[2577]: E0702 01:51:37.879738 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.881914 kubelet[2577]: E0702 01:51:37.881886 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.882238 kubelet[2577]: W0702 01:51:37.881986 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.882238 kubelet[2577]: E0702 01:51:37.882031 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.882377 kubelet[2577]: E0702 01:51:37.882363 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.882436 kubelet[2577]: W0702 01:51:37.882425 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.882529 kubelet[2577]: E0702 01:51:37.882508 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.882765 kubelet[2577]: E0702 01:51:37.882751 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.882884 kubelet[2577]: W0702 01:51:37.882869 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.882979 kubelet[2577]: E0702 01:51:37.882969 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.902232 env[1468]: time="2024-07-02T01:51:37.902169853Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:51:37.902458 env[1468]: time="2024-07-02T01:51:37.902418265Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:51:37.902801 env[1468]: time="2024-07-02T01:51:37.902773523Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:51:37.903058 env[1468]: time="2024-07-02T01:51:37.903027976Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4d72fa2cfb6da82971bad32e4b85d52d2371be56ee9028e789ecdcf009bf8151 pid=2965 runtime=io.containerd.runc.v2 Jul 2 01:51:37.912258 kubelet[2577]: E0702 01:51:37.912225 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.912419 kubelet[2577]: W0702 01:51:37.912403 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.912504 kubelet[2577]: E0702 01:51:37.912494 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.923074 systemd[1]: Started cri-containerd-4d72fa2cfb6da82971bad32e4b85d52d2371be56ee9028e789ecdcf009bf8151.scope. Jul 2 01:51:37.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.952000 audit: BPF prog-id=119 op=LOAD Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2965 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:37.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373266613263666236646138323937316261643332653462383564 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2965 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:37.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373266613263666236646138323937316261643332653462383564 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit: BPF prog-id=120 op=LOAD Jul 2 01:51:37.953000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2965 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:37.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373266613263666236646138323937316261643332653462383564 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit: BPF prog-id=121 op=LOAD Jul 2 01:51:37.953000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2965 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:37.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373266613263666236646138323937316261643332653462383564 Jul 2 01:51:37.953000 audit: BPF prog-id=121 op=UNLOAD Jul 2 01:51:37.953000 audit: BPF prog-id=120 op=UNLOAD Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:37.953000 audit: BPF prog-id=122 op=LOAD Jul 2 01:51:37.953000 audit[2973]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2965 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:37.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373266613263666236646138323937316261643332653462383564 Jul 2 01:51:37.963555 kubelet[2577]: E0702 01:51:37.963527 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.963555 kubelet[2577]: W0702 01:51:37.963546 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.963717 kubelet[2577]: E0702 01:51:37.963567 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.963997 kubelet[2577]: E0702 01:51:37.963874 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.963997 kubelet[2577]: W0702 01:51:37.963889 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.963997 kubelet[2577]: E0702 01:51:37.963905 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.964321 kubelet[2577]: E0702 01:51:37.964181 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.964321 kubelet[2577]: W0702 01:51:37.964195 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.964321 kubelet[2577]: E0702 01:51:37.964227 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.964621 kubelet[2577]: E0702 01:51:37.964488 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.964621 kubelet[2577]: W0702 01:51:37.964500 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.964621 kubelet[2577]: E0702 01:51:37.964534 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.965193 kubelet[2577]: E0702 01:51:37.964777 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.965193 kubelet[2577]: W0702 01:51:37.964788 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.965193 kubelet[2577]: E0702 01:51:37.964821 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.965193 kubelet[2577]: E0702 01:51:37.965054 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.965193 kubelet[2577]: W0702 01:51:37.965066 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.965193 kubelet[2577]: E0702 01:51:37.965085 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.965766 kubelet[2577]: E0702 01:51:37.965440 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.965766 kubelet[2577]: W0702 01:51:37.965457 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.965766 kubelet[2577]: E0702 01:51:37.965486 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.965766 kubelet[2577]: E0702 01:51:37.965685 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.965766 kubelet[2577]: W0702 01:51:37.965693 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.965766 kubelet[2577]: E0702 01:51:37.965722 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.966305 kubelet[2577]: E0702 01:51:37.966021 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.966305 kubelet[2577]: W0702 01:51:37.966034 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.966305 kubelet[2577]: E0702 01:51:37.966064 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.966305 kubelet[2577]: E0702 01:51:37.966204 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.966305 kubelet[2577]: W0702 01:51:37.966214 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.966305 kubelet[2577]: E0702 01:51:37.966230 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.967751 kubelet[2577]: E0702 01:51:37.967427 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.967751 kubelet[2577]: W0702 01:51:37.967448 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.967751 kubelet[2577]: E0702 01:51:37.967486 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.967751 kubelet[2577]: E0702 01:51:37.967665 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.967751 kubelet[2577]: W0702 01:51:37.967675 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.967751 kubelet[2577]: E0702 01:51:37.967696 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.968283 kubelet[2577]: E0702 01:51:37.967883 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.968283 kubelet[2577]: W0702 01:51:37.967894 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.968283 kubelet[2577]: E0702 01:51:37.967919 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.968535 kubelet[2577]: E0702 01:51:37.968419 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.968535 kubelet[2577]: W0702 01:51:37.968435 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.968613 kubelet[2577]: E0702 01:51:37.968564 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.969428 kubelet[2577]: E0702 01:51:37.969344 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.969428 kubelet[2577]: W0702 01:51:37.969362 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.969428 kubelet[2577]: E0702 01:51:37.969385 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.969619 kubelet[2577]: E0702 01:51:37.969590 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.969619 kubelet[2577]: W0702 01:51:37.969610 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.969619 kubelet[2577]: E0702 01:51:37.969628 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.969903 kubelet[2577]: E0702 01:51:37.969883 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.969968 kubelet[2577]: W0702 01:51:37.969906 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.970015 kubelet[2577]: E0702 01:51:37.969996 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.970132 kubelet[2577]: E0702 01:51:37.970105 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.970132 kubelet[2577]: W0702 01:51:37.970117 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.970302 kubelet[2577]: E0702 01:51:37.970204 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.970421 kubelet[2577]: E0702 01:51:37.970404 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.970421 kubelet[2577]: W0702 01:51:37.970419 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.970579 kubelet[2577]: E0702 01:51:37.970516 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.970697 kubelet[2577]: E0702 01:51:37.970682 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.970697 kubelet[2577]: W0702 01:51:37.970696 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.971124 kubelet[2577]: E0702 01:51:37.970795 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.971124 kubelet[2577]: E0702 01:51:37.970855 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.971124 kubelet[2577]: W0702 01:51:37.970918 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.971124 kubelet[2577]: E0702 01:51:37.970933 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.971426 kubelet[2577]: E0702 01:51:37.971315 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.971426 kubelet[2577]: W0702 01:51:37.971330 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.971426 kubelet[2577]: E0702 01:51:37.971346 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.974180 kubelet[2577]: E0702 01:51:37.974078 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.974180 kubelet[2577]: W0702 01:51:37.974094 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.974180 kubelet[2577]: E0702 01:51:37.974120 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.974562 kubelet[2577]: E0702 01:51:37.974534 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.974562 kubelet[2577]: W0702 01:51:37.974548 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.974664 kubelet[2577]: E0702 01:51:37.974567 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.974989 kubelet[2577]: E0702 01:51:37.974972 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.974989 kubelet[2577]: W0702 01:51:37.974986 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.975097 kubelet[2577]: E0702 01:51:37.975001 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:37.983413 env[1468]: time="2024-07-02T01:51:37.983371054Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7649d9d57c-vb5fb,Uid:da6c9db2-4ca1-4b68-a465-54fc748a98b1,Namespace:calico-system,Attempt:0,} returns sandbox id \"4d72fa2cfb6da82971bad32e4b85d52d2371be56ee9028e789ecdcf009bf8151\"" Jul 2 01:51:37.985149 env[1468]: time="2024-07-02T01:51:37.985113101Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\"" Jul 2 01:51:37.995362 kubelet[2577]: E0702 01:51:37.995335 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:37.995362 kubelet[2577]: W0702 01:51:37.995355 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:37.995487 kubelet[2577]: E0702 01:51:37.995374 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:38.009631 env[1468]: time="2024-07-02T01:51:38.009596111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-n8lm8,Uid:03d479e1-4fd2-4d86-91cc-51282e6bdfea,Namespace:calico-system,Attempt:0,}" Jul 2 01:51:38.047711 env[1468]: time="2024-07-02T01:51:38.046290383Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:51:38.047711 env[1468]: time="2024-07-02T01:51:38.046333785Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:51:38.047711 env[1468]: time="2024-07-02T01:51:38.046343865Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:51:38.047711 env[1468]: time="2024-07-02T01:51:38.046441670Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3c50195d8cbaece3311aa72eff6b6c56580544460d207472d0273d92b481c8a0 pid=3036 runtime=io.containerd.runc.v2 Jul 2 01:51:38.068650 systemd[1]: Started cri-containerd-3c50195d8cbaece3311aa72eff6b6c56580544460d207472d0273d92b481c8a0.scope. Jul 2 01:51:38.086706 kernel: kauditd_printk_skb: 116 callbacks suppressed Jul 2 01:51:38.086840 kernel: audit: type=1400 audit(1719885098.080:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.123081 kernel: audit: type=1400 audit(1719885098.080:948): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.128959 kernel: audit: type=1400 audit(1719885098.080:949): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.143768 kernel: audit: type=1400 audit(1719885098.080:950): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.173154 kernel: audit: type=1400 audit(1719885098.080:951): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.178994 kernel: audit: type=1400 audit(1719885098.080:952): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.207904 kernel: audit: type=1400 audit(1719885098.080:953): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.226081 kernel: audit: type=1400 audit(1719885098.080:954): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.242509 kernel: audit: type=1400 audit(1719885098.080:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.243993 env[1468]: time="2024-07-02T01:51:38.243958436Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-n8lm8,Uid:03d479e1-4fd2-4d86-91cc-51282e6bdfea,Namespace:calico-system,Attempt:0,} returns sandbox id \"3c50195d8cbaece3311aa72eff6b6c56580544460d207472d0273d92b481c8a0\"" Jul 2 01:51:38.259616 kernel: audit: type=1400 audit(1719885098.085:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.085000 audit: BPF prog-id=123 op=LOAD Jul 2 01:51:38.103000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.103000 audit[3047]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3036 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:38.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363353031393564386362616563653333313161613732656666366236 Jul 2 01:51:38.103000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.103000 audit[3047]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3036 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:38.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363353031393564386362616563653333313161613732656666366236 Jul 2 01:51:38.103000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.103000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.103000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.103000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.103000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.103000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.103000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.103000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.103000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.103000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.103000 audit: BPF prog-id=124 op=LOAD Jul 2 01:51:38.103000 audit[3047]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3036 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:38.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363353031393564386362616563653333313161613732656666366236 Jul 2 01:51:38.128000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.128000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.128000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.128000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.128000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.128000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.128000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.128000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.128000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.128000 audit: BPF prog-id=125 op=LOAD Jul 2 01:51:38.128000 audit[3047]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3036 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:38.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363353031393564386362616563653333313161613732656666366236 Jul 2 01:51:38.143000 audit: BPF prog-id=125 op=UNLOAD Jul 2 01:51:38.143000 audit: BPF prog-id=124 op=UNLOAD Jul 2 01:51:38.143000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.143000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.143000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.143000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.143000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.143000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.143000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.143000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.143000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.143000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:38.143000 audit: BPF prog-id=126 op=LOAD Jul 2 01:51:38.143000 audit[3047]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3036 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:38.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363353031393564386362616563653333313161613732656666366236 Jul 2 01:51:38.450000 audit[3070]: NETFILTER_CFG table=filter:96 family=2 entries=16 op=nft_register_rule pid=3070 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:38.450000 audit[3070]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff5ce3060 a2=0 a3=1 items=0 ppid=2755 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:38.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:38.450000 audit[3070]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=3070 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:38.450000 audit[3070]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff5ce3060 a2=0 a3=1 items=0 ppid=2755 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:38.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:39.831770 kubelet[2577]: E0702 01:51:39.831734 2577 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x8j4l" podUID="0a1ebfc4-789b-4005-bedf-61c880e9e47c" Jul 2 01:51:40.126312 env[1468]: time="2024-07-02T01:51:40.126189269Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:40.133899 env[1468]: time="2024-07-02T01:51:40.133855069Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2551880d36cd0ce4c6820747ffe4c40cbf344d26df0ecd878808432ad4f78f03,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:40.137312 env[1468]: time="2024-07-02T01:51:40.137282391Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:40.142225 env[1468]: time="2024-07-02T01:51:40.142196422Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:eff1501af12b7e27e2ef8f4e55d03d837bcb017aa5663e22e519059c452d51ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:40.142684 env[1468]: time="2024-07-02T01:51:40.142656684Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\" returns image reference \"sha256:2551880d36cd0ce4c6820747ffe4c40cbf344d26df0ecd878808432ad4f78f03\"" Jul 2 01:51:40.143242 env[1468]: time="2024-07-02T01:51:40.143217870Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 01:51:40.157281 env[1468]: time="2024-07-02T01:51:40.157249210Z" level=info msg="CreateContainer within sandbox \"4d72fa2cfb6da82971bad32e4b85d52d2371be56ee9028e789ecdcf009bf8151\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 2 01:51:40.187395 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3873913111.mount: Deactivated successfully. Jul 2 01:51:40.206819 env[1468]: time="2024-07-02T01:51:40.206754300Z" level=info msg="CreateContainer within sandbox \"4d72fa2cfb6da82971bad32e4b85d52d2371be56ee9028e789ecdcf009bf8151\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"d14033a02e69210c27eb9fb6e776ce1b779843f3a444147b0b3ddfb2d7de6a95\"" Jul 2 01:51:40.207397 env[1468]: time="2024-07-02T01:51:40.207375609Z" level=info msg="StartContainer for \"d14033a02e69210c27eb9fb6e776ce1b779843f3a444147b0b3ddfb2d7de6a95\"" Jul 2 01:51:40.230224 systemd[1]: Started cri-containerd-d14033a02e69210c27eb9fb6e776ce1b779843f3a444147b0b3ddfb2d7de6a95.scope. Jul 2 01:51:40.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit: BPF prog-id=127 op=LOAD Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2965 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:40.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431343033336130326536393231306332376562396662366537373663 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2965 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:40.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431343033336130326536393231306332376562396662366537373663 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit: BPF prog-id=128 op=LOAD Jul 2 01:51:40.242000 audit[3082]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2965 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:40.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431343033336130326536393231306332376562396662366537373663 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit: BPF prog-id=129 op=LOAD Jul 2 01:51:40.242000 audit[3082]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2965 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:40.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431343033336130326536393231306332376562396662366537373663 Jul 2 01:51:40.242000 audit: BPF prog-id=129 op=UNLOAD Jul 2 01:51:40.242000 audit: BPF prog-id=128 op=UNLOAD Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:40.242000 audit: BPF prog-id=130 op=LOAD Jul 2 01:51:40.242000 audit[3082]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2965 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:40.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431343033336130326536393231306332376562396662366537373663 Jul 2 01:51:40.269820 env[1468]: time="2024-07-02T01:51:40.269761665Z" level=info msg="StartContainer for \"d14033a02e69210c27eb9fb6e776ce1b779843f3a444147b0b3ddfb2d7de6a95\" returns successfully" Jul 2 01:51:40.957099 kubelet[2577]: I0702 01:51:40.957064 2577 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-7649d9d57c-vb5fb" podStartSLOduration=1.7986440639999999 podCreationTimestamp="2024-07-02 01:51:37 +0000 UTC" firstStartedPulling="2024-07-02 01:51:37.98469984 +0000 UTC m=+22.240355403" lastFinishedPulling="2024-07-02 01:51:40.143086544 +0000 UTC m=+24.398742107" observedRunningTime="2024-07-02 01:51:40.955979559 +0000 UTC m=+25.211635122" watchObservedRunningTime="2024-07-02 01:51:40.957030768 +0000 UTC m=+25.212686331" Jul 2 01:51:40.977504 kubelet[2577]: E0702 01:51:40.977470 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.977504 kubelet[2577]: W0702 01:51:40.977495 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.977657 kubelet[2577]: E0702 01:51:40.977516 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.977702 kubelet[2577]: E0702 01:51:40.977658 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.977702 kubelet[2577]: W0702 01:51:40.977666 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.977702 kubelet[2577]: E0702 01:51:40.977677 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.977924 kubelet[2577]: E0702 01:51:40.977909 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.977924 kubelet[2577]: W0702 01:51:40.977921 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.978019 kubelet[2577]: E0702 01:51:40.977932 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.978078 kubelet[2577]: E0702 01:51:40.978061 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.978078 kubelet[2577]: W0702 01:51:40.978074 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.978149 kubelet[2577]: E0702 01:51:40.978084 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.978294 kubelet[2577]: E0702 01:51:40.978280 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.978294 kubelet[2577]: W0702 01:51:40.978291 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.978376 kubelet[2577]: E0702 01:51:40.978302 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.978437 kubelet[2577]: E0702 01:51:40.978425 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.978437 kubelet[2577]: W0702 01:51:40.978436 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.978506 kubelet[2577]: E0702 01:51:40.978446 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.978645 kubelet[2577]: E0702 01:51:40.978631 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.978645 kubelet[2577]: W0702 01:51:40.978641 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.978725 kubelet[2577]: E0702 01:51:40.978651 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.978791 kubelet[2577]: E0702 01:51:40.978779 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.978791 kubelet[2577]: W0702 01:51:40.978789 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.978881 kubelet[2577]: E0702 01:51:40.978801 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.979029 kubelet[2577]: E0702 01:51:40.979015 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.979029 kubelet[2577]: W0702 01:51:40.979026 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.979113 kubelet[2577]: E0702 01:51:40.979037 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.979170 kubelet[2577]: E0702 01:51:40.979155 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.979170 kubelet[2577]: W0702 01:51:40.979166 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.979239 kubelet[2577]: E0702 01:51:40.979178 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.979375 kubelet[2577]: E0702 01:51:40.979361 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.979375 kubelet[2577]: W0702 01:51:40.979373 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.979487 kubelet[2577]: E0702 01:51:40.979384 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.979514 kubelet[2577]: E0702 01:51:40.979498 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.979514 kubelet[2577]: W0702 01:51:40.979504 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.979514 kubelet[2577]: E0702 01:51:40.979513 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.979691 kubelet[2577]: E0702 01:51:40.979678 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.979691 kubelet[2577]: W0702 01:51:40.979688 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.979775 kubelet[2577]: E0702 01:51:40.979698 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.979863 kubelet[2577]: E0702 01:51:40.979848 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.979863 kubelet[2577]: W0702 01:51:40.979860 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.979941 kubelet[2577]: E0702 01:51:40.979870 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.980075 kubelet[2577]: E0702 01:51:40.980062 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.980075 kubelet[2577]: W0702 01:51:40.980072 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.980147 kubelet[2577]: E0702 01:51:40.980081 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.993471 kubelet[2577]: E0702 01:51:40.993452 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.993614 kubelet[2577]: W0702 01:51:40.993601 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.993681 kubelet[2577]: E0702 01:51:40.993672 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.994194 kubelet[2577]: E0702 01:51:40.994178 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.994296 kubelet[2577]: W0702 01:51:40.994283 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.994377 kubelet[2577]: E0702 01:51:40.994366 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.994614 kubelet[2577]: E0702 01:51:40.994603 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.994691 kubelet[2577]: W0702 01:51:40.994679 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.994765 kubelet[2577]: E0702 01:51:40.994755 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.994985 kubelet[2577]: E0702 01:51:40.994935 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.994985 kubelet[2577]: W0702 01:51:40.994952 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.994985 kubelet[2577]: E0702 01:51:40.994970 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.995556 kubelet[2577]: E0702 01:51:40.995522 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.995556 kubelet[2577]: W0702 01:51:40.995546 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.995648 kubelet[2577]: E0702 01:51:40.995573 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.995754 kubelet[2577]: E0702 01:51:40.995733 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.995754 kubelet[2577]: W0702 01:51:40.995746 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.995867 kubelet[2577]: E0702 01:51:40.995757 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.996159 kubelet[2577]: E0702 01:51:40.996140 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.996159 kubelet[2577]: W0702 01:51:40.996156 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.996255 kubelet[2577]: E0702 01:51:40.996232 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.996612 kubelet[2577]: E0702 01:51:40.996594 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.996612 kubelet[2577]: W0702 01:51:40.996609 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.996727 kubelet[2577]: E0702 01:51:40.996713 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.996975 kubelet[2577]: E0702 01:51:40.996956 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.996975 kubelet[2577]: W0702 01:51:40.996971 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.997078 kubelet[2577]: E0702 01:51:40.997049 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.997184 kubelet[2577]: E0702 01:51:40.997154 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.997184 kubelet[2577]: W0702 01:51:40.997179 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.997302 kubelet[2577]: E0702 01:51:40.997195 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.997457 kubelet[2577]: E0702 01:51:40.997442 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.997457 kubelet[2577]: W0702 01:51:40.997455 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.997528 kubelet[2577]: E0702 01:51:40.997470 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.997632 kubelet[2577]: E0702 01:51:40.997615 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.997632 kubelet[2577]: W0702 01:51:40.997629 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.997710 kubelet[2577]: E0702 01:51:40.997646 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.997911 kubelet[2577]: E0702 01:51:40.997896 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.997911 kubelet[2577]: W0702 01:51:40.997908 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.997987 kubelet[2577]: E0702 01:51:40.997924 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.998244 kubelet[2577]: E0702 01:51:40.998227 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.998244 kubelet[2577]: W0702 01:51:40.998239 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.998389 kubelet[2577]: E0702 01:51:40.998376 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.998527 kubelet[2577]: E0702 01:51:40.998378 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.998596 kubelet[2577]: W0702 01:51:40.998584 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.998654 kubelet[2577]: E0702 01:51:40.998645 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.998932 kubelet[2577]: E0702 01:51:40.998919 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.999008 kubelet[2577]: W0702 01:51:40.998996 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.999095 kubelet[2577]: E0702 01:51:40.999085 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:40.999308 kubelet[2577]: E0702 01:51:40.999296 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:40.999375 kubelet[2577]: W0702 01:51:40.999364 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:40.999430 kubelet[2577]: E0702 01:51:40.999421 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:41.000119 kubelet[2577]: E0702 01:51:41.000102 2577 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:41.000204 kubelet[2577]: W0702 01:51:41.000192 2577 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:41.000273 kubelet[2577]: E0702 01:51:41.000264 2577 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:41.642975 env[1468]: time="2024-07-02T01:51:41.642931504Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:41.654782 env[1468]: time="2024-07-02T01:51:41.654748330Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b6a6a9b369fa6127e23e376ac423670fa81290e0860917acaacae108e3cc064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:41.660168 env[1468]: time="2024-07-02T01:51:41.660142900Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:41.665120 env[1468]: time="2024-07-02T01:51:41.665093648Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:41.665782 env[1468]: time="2024-07-02T01:51:41.665757839Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:4b6a6a9b369fa6127e23e376ac423670fa81290e0860917acaacae108e3cc064\"" Jul 2 01:51:41.668110 env[1468]: time="2024-07-02T01:51:41.668072186Z" level=info msg="CreateContainer within sandbox \"3c50195d8cbaece3311aa72eff6b6c56580544460d207472d0273d92b481c8a0\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 01:51:41.696851 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1810350649.mount: Deactivated successfully. Jul 2 01:51:41.724553 env[1468]: time="2024-07-02T01:51:41.724489113Z" level=info msg="CreateContainer within sandbox \"3c50195d8cbaece3311aa72eff6b6c56580544460d207472d0273d92b481c8a0\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"71718a3896792ab1e06ffe7a13285246d4c9fbc6757221707ef1a2911cc5403f\"" Jul 2 01:51:41.725948 env[1468]: time="2024-07-02T01:51:41.725911419Z" level=info msg="StartContainer for \"71718a3896792ab1e06ffe7a13285246d4c9fbc6757221707ef1a2911cc5403f\"" Jul 2 01:51:41.754867 systemd[1]: Started cri-containerd-71718a3896792ab1e06ffe7a13285246d4c9fbc6757221707ef1a2911cc5403f.scope. Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3036 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373138613338393637393261623165303666666537613133323835 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit: BPF prog-id=131 op=LOAD Jul 2 01:51:41.777000 audit[3152]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3036 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373138613338393637393261623165303666666537613133323835 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit: BPF prog-id=132 op=LOAD Jul 2 01:51:41.777000 audit[3152]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3036 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373138613338393637393261623165303666666537613133323835 Jul 2 01:51:41.777000 audit: BPF prog-id=132 op=UNLOAD Jul 2 01:51:41.777000 audit: BPF prog-id=131 op=UNLOAD Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { perfmon } for pid=3152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit[3152]: AVC avc: denied { bpf } for pid=3152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.777000 audit: BPF prog-id=133 op=LOAD Jul 2 01:51:41.777000 audit[3152]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3036 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373138613338393637393261623165303666666537613133323835 Jul 2 01:51:41.793039 env[1468]: time="2024-07-02T01:51:41.792989839Z" level=info msg="StartContainer for \"71718a3896792ab1e06ffe7a13285246d4c9fbc6757221707ef1a2911cc5403f\" returns successfully" Jul 2 01:51:41.801079 systemd[1]: cri-containerd-71718a3896792ab1e06ffe7a13285246d4c9fbc6757221707ef1a2911cc5403f.scope: Deactivated successfully. Jul 2 01:51:41.803000 audit: BPF prog-id=133 op=UNLOAD Jul 2 01:51:41.832219 kubelet[2577]: E0702 01:51:41.831903 2577 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x8j4l" podUID="0a1ebfc4-789b-4005-bedf-61c880e9e47c" Jul 2 01:51:41.948898 kubelet[2577]: I0702 01:51:41.948789 2577 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 01:51:42.148513 systemd[1]: run-containerd-runc-k8s.io-71718a3896792ab1e06ffe7a13285246d4c9fbc6757221707ef1a2911cc5403f-runc.1YoGme.mount: Deactivated successfully. Jul 2 01:51:42.148600 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-71718a3896792ab1e06ffe7a13285246d4c9fbc6757221707ef1a2911cc5403f-rootfs.mount: Deactivated successfully. Jul 2 01:51:42.732734 env[1468]: time="2024-07-02T01:51:42.732683028Z" level=info msg="shim disconnected" id=71718a3896792ab1e06ffe7a13285246d4c9fbc6757221707ef1a2911cc5403f Jul 2 01:51:42.732734 env[1468]: time="2024-07-02T01:51:42.732730710Z" level=warning msg="cleaning up after shim disconnected" id=71718a3896792ab1e06ffe7a13285246d4c9fbc6757221707ef1a2911cc5403f namespace=k8s.io Jul 2 01:51:42.732734 env[1468]: time="2024-07-02T01:51:42.732739790Z" level=info msg="cleaning up dead shim" Jul 2 01:51:42.741828 env[1468]: time="2024-07-02T01:51:42.741721358Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:51:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3196 runtime=io.containerd.runc.v2\n" Jul 2 01:51:42.953564 env[1468]: time="2024-07-02T01:51:42.953521893Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 01:51:43.831457 kubelet[2577]: E0702 01:51:43.831289 2577 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x8j4l" podUID="0a1ebfc4-789b-4005-bedf-61c880e9e47c" Jul 2 01:51:45.832329 kubelet[2577]: E0702 01:51:45.831218 2577 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x8j4l" podUID="0a1ebfc4-789b-4005-bedf-61c880e9e47c" Jul 2 01:51:47.623180 env[1468]: time="2024-07-02T01:51:47.623130349Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:47.633583 env[1468]: time="2024-07-02T01:51:47.633546383Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:adcb19ea66141abcd7dc426e3205f2e6ff26e524a3f7148c97f3d49933f502ee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:47.637041 env[1468]: time="2024-07-02T01:51:47.637005567Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:47.642370 env[1468]: time="2024-07-02T01:51:47.642331669Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:47.642770 env[1468]: time="2024-07-02T01:51:47.642740846Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:adcb19ea66141abcd7dc426e3205f2e6ff26e524a3f7148c97f3d49933f502ee\"" Jul 2 01:51:47.645502 env[1468]: time="2024-07-02T01:51:47.645468920Z" level=info msg="CreateContainer within sandbox \"3c50195d8cbaece3311aa72eff6b6c56580544460d207472d0273d92b481c8a0\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 01:51:47.676966 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount171251368.mount: Deactivated successfully. Jul 2 01:51:47.698018 env[1468]: time="2024-07-02T01:51:47.697949786Z" level=info msg="CreateContainer within sandbox \"3c50195d8cbaece3311aa72eff6b6c56580544460d207472d0273d92b481c8a0\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"b17423a6af66bf38f01dd778f154367dc1ed3ca71dbde36762d0a449c30d9cb9\"" Jul 2 01:51:47.700082 env[1468]: time="2024-07-02T01:51:47.700048194Z" level=info msg="StartContainer for \"b17423a6af66bf38f01dd778f154367dc1ed3ca71dbde36762d0a449c30d9cb9\"" Jul 2 01:51:47.720067 systemd[1]: Started cri-containerd-b17423a6af66bf38f01dd778f154367dc1ed3ca71dbde36762d0a449c30d9cb9.scope. Jul 2 01:51:47.737000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.743454 kernel: kauditd_printk_skb: 154 callbacks suppressed Jul 2 01:51:47.743541 kernel: audit: type=1400 audit(1719885107.737:992): avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.737000 audit[3218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3036 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:47.783729 kernel: audit: type=1300 audit(1719885107.737:992): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3036 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:47.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231373432336136616636366266333866303164643737386631353433 Jul 2 01:51:47.807605 kernel: audit: type=1327 audit(1719885107.737:992): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231373432336136616636366266333866303164643737386631353433 Jul 2 01:51:47.737000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.824786 kernel: audit: type=1400 audit(1719885107.737:993): avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.737000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.840792 kernel: audit: type=1400 audit(1719885107.737:993): avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.842699 kubelet[2577]: E0702 01:51:47.842493 2577 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x8j4l" podUID="0a1ebfc4-789b-4005-bedf-61c880e9e47c" Jul 2 01:51:47.737000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.858613 kernel: audit: type=1400 audit(1719885107.737:993): avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.737000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.875006 kernel: audit: type=1400 audit(1719885107.737:993): avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.737000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.892574 kernel: audit: type=1400 audit(1719885107.737:993): avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.896318 kernel: audit: type=1400 audit(1719885107.737:993): avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.737000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.737000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.925764 kernel: audit: type=1400 audit(1719885107.737:993): avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.737000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.737000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.737000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.737000 audit: BPF prog-id=134 op=LOAD Jul 2 01:51:47.737000 audit[3218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3036 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:47.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231373432336136616636366266333866303164643737386631353433 Jul 2 01:51:47.742000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.742000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.742000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.742000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.742000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.742000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.742000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.742000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.742000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.742000 audit: BPF prog-id=135 op=LOAD Jul 2 01:51:47.742000 audit[3218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3036 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:47.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231373432336136616636366266333866303164643737386631353433 Jul 2 01:51:47.758000 audit: BPF prog-id=135 op=UNLOAD Jul 2 01:51:47.758000 audit: BPF prog-id=134 op=UNLOAD Jul 2 01:51:47.758000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.758000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.758000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.758000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.758000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.758000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.758000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.758000 audit[3218]: AVC avc: denied { perfmon } for pid=3218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.758000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.758000 audit[3218]: AVC avc: denied { bpf } for pid=3218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:47.758000 audit: BPF prog-id=136 op=LOAD Jul 2 01:51:47.758000 audit[3218]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3036 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:47.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231373432336136616636366266333866303164643737386631353433 Jul 2 01:51:47.927784 env[1468]: time="2024-07-02T01:51:47.927744522Z" level=info msg="StartContainer for \"b17423a6af66bf38f01dd778f154367dc1ed3ca71dbde36762d0a449c30d9cb9\" returns successfully" Jul 2 01:51:49.003330 env[1468]: time="2024-07-02T01:51:49.003260378Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 01:51:49.005556 systemd[1]: cri-containerd-b17423a6af66bf38f01dd778f154367dc1ed3ca71dbde36762d0a449c30d9cb9.scope: Deactivated successfully. Jul 2 01:51:49.009000 audit: BPF prog-id=136 op=UNLOAD Jul 2 01:51:49.023232 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b17423a6af66bf38f01dd778f154367dc1ed3ca71dbde36762d0a449c30d9cb9-rootfs.mount: Deactivated successfully. Jul 2 01:51:49.075884 kubelet[2577]: I0702 01:51:49.075852 2577 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Jul 2 01:51:49.418638 kubelet[2577]: I0702 01:51:49.096909 2577 topology_manager.go:215] "Topology Admit Handler" podUID="cd129927-de23-4f7e-818e-a81e909f547e" podNamespace="kube-system" podName="coredns-5dd5756b68-mq8sg" Jul 2 01:51:49.418638 kubelet[2577]: I0702 01:51:49.104096 2577 topology_manager.go:215] "Topology Admit Handler" podUID="c04d0a21-b743-4537-bbf9-f6bf77a42e92" podNamespace="kube-system" podName="coredns-5dd5756b68-6rqtp" Jul 2 01:51:49.418638 kubelet[2577]: I0702 01:51:49.106609 2577 topology_manager.go:215] "Topology Admit Handler" podUID="87736a6b-5853-42b9-90a8-2fa967051fc1" podNamespace="calico-system" podName="calico-kube-controllers-6456d768b7-p5gwp" Jul 2 01:51:49.418638 kubelet[2577]: I0702 01:51:49.248424 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/cd129927-de23-4f7e-818e-a81e909f547e-config-volume\") pod \"coredns-5dd5756b68-mq8sg\" (UID: \"cd129927-de23-4f7e-818e-a81e909f547e\") " pod="kube-system/coredns-5dd5756b68-mq8sg" Jul 2 01:51:49.418638 kubelet[2577]: I0702 01:51:49.248488 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q2zd4\" (UniqueName: \"kubernetes.io/projected/c04d0a21-b743-4537-bbf9-f6bf77a42e92-kube-api-access-q2zd4\") pod \"coredns-5dd5756b68-6rqtp\" (UID: \"c04d0a21-b743-4537-bbf9-f6bf77a42e92\") " pod="kube-system/coredns-5dd5756b68-6rqtp" Jul 2 01:51:49.418638 kubelet[2577]: I0702 01:51:49.248512 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/87736a6b-5853-42b9-90a8-2fa967051fc1-tigera-ca-bundle\") pod \"calico-kube-controllers-6456d768b7-p5gwp\" (UID: \"87736a6b-5853-42b9-90a8-2fa967051fc1\") " pod="calico-system/calico-kube-controllers-6456d768b7-p5gwp" Jul 2 01:51:49.101706 systemd[1]: Created slice kubepods-burstable-podcd129927_de23_4f7e_818e_a81e909f547e.slice. Jul 2 01:51:49.419013 kubelet[2577]: I0702 01:51:49.248562 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c04d0a21-b743-4537-bbf9-f6bf77a42e92-config-volume\") pod \"coredns-5dd5756b68-6rqtp\" (UID: \"c04d0a21-b743-4537-bbf9-f6bf77a42e92\") " pod="kube-system/coredns-5dd5756b68-6rqtp" Jul 2 01:51:49.419013 kubelet[2577]: I0702 01:51:49.248596 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bflbn\" (UniqueName: \"kubernetes.io/projected/87736a6b-5853-42b9-90a8-2fa967051fc1-kube-api-access-bflbn\") pod \"calico-kube-controllers-6456d768b7-p5gwp\" (UID: \"87736a6b-5853-42b9-90a8-2fa967051fc1\") " pod="calico-system/calico-kube-controllers-6456d768b7-p5gwp" Jul 2 01:51:49.419013 kubelet[2577]: I0702 01:51:49.248652 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5v7nl\" (UniqueName: \"kubernetes.io/projected/cd129927-de23-4f7e-818e-a81e909f547e-kube-api-access-5v7nl\") pod \"coredns-5dd5756b68-mq8sg\" (UID: \"cd129927-de23-4f7e-818e-a81e909f547e\") " pod="kube-system/coredns-5dd5756b68-mq8sg" Jul 2 01:51:49.109589 systemd[1]: Created slice kubepods-burstable-podc04d0a21_b743_4537_bbf9_f6bf77a42e92.slice. Jul 2 01:51:49.115123 systemd[1]: Created slice kubepods-besteffort-pod87736a6b_5853_42b9_90a8_2fa967051fc1.slice. Jul 2 01:51:49.723843 env[1468]: time="2024-07-02T01:51:49.723691719Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-mq8sg,Uid:cd129927-de23-4f7e-818e-a81e909f547e,Namespace:kube-system,Attempt:0,}" Jul 2 01:51:49.724362 env[1468]: time="2024-07-02T01:51:49.724168898Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6456d768b7-p5gwp,Uid:87736a6b-5853-42b9-90a8-2fa967051fc1,Namespace:calico-system,Attempt:0,}" Jul 2 01:51:49.725170 env[1468]: time="2024-07-02T01:51:49.724956010Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-6rqtp,Uid:c04d0a21-b743-4537-bbf9-f6bf77a42e92,Namespace:kube-system,Attempt:0,}" Jul 2 01:51:49.837395 systemd[1]: Created slice kubepods-besteffort-pod0a1ebfc4_789b_4005_bedf_61c880e9e47c.slice. Jul 2 01:51:49.840336 env[1468]: time="2024-07-02T01:51:49.840116535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x8j4l,Uid:0a1ebfc4-789b-4005-bedf-61c880e9e47c,Namespace:calico-system,Attempt:0,}" Jul 2 01:51:50.181072 env[1468]: time="2024-07-02T01:51:50.181017132Z" level=info msg="shim disconnected" id=b17423a6af66bf38f01dd778f154367dc1ed3ca71dbde36762d0a449c30d9cb9 Jul 2 01:51:50.181072 env[1468]: time="2024-07-02T01:51:50.181066094Z" level=warning msg="cleaning up after shim disconnected" id=b17423a6af66bf38f01dd778f154367dc1ed3ca71dbde36762d0a449c30d9cb9 namespace=k8s.io Jul 2 01:51:50.181072 env[1468]: time="2024-07-02T01:51:50.181075375Z" level=info msg="cleaning up dead shim" Jul 2 01:51:50.188425 env[1468]: time="2024-07-02T01:51:50.188383825Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:51:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3266 runtime=io.containerd.runc.v2\n" Jul 2 01:51:50.358672 env[1468]: time="2024-07-02T01:51:50.358596103Z" level=error msg="Failed to destroy network for sandbox \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:50.359016 env[1468]: time="2024-07-02T01:51:50.358975038Z" level=error msg="encountered an error cleaning up failed sandbox \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:50.359074 env[1468]: time="2024-07-02T01:51:50.359030040Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-mq8sg,Uid:cd129927-de23-4f7e-818e-a81e909f547e,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:50.359299 kubelet[2577]: E0702 01:51:50.359274 2577 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:50.359534 kubelet[2577]: E0702 01:51:50.359343 2577 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-mq8sg" Jul 2 01:51:50.359534 kubelet[2577]: E0702 01:51:50.359362 2577 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-mq8sg" Jul 2 01:51:50.359534 kubelet[2577]: E0702 01:51:50.359427 2577 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-mq8sg_kube-system(cd129927-de23-4f7e-818e-a81e909f547e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-mq8sg_kube-system(cd129927-de23-4f7e-818e-a81e909f547e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-mq8sg" podUID="cd129927-de23-4f7e-818e-a81e909f547e" Jul 2 01:51:50.364982 env[1468]: time="2024-07-02T01:51:50.364934994Z" level=error msg="Failed to destroy network for sandbox \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:50.365451 env[1468]: time="2024-07-02T01:51:50.365418454Z" level=error msg="encountered an error cleaning up failed sandbox \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:50.365633 env[1468]: time="2024-07-02T01:51:50.365603461Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6456d768b7-p5gwp,Uid:87736a6b-5853-42b9-90a8-2fa967051fc1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:50.365989 kubelet[2577]: E0702 01:51:50.365957 2577 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:50.366080 kubelet[2577]: E0702 01:51:50.366024 2577 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6456d768b7-p5gwp" Jul 2 01:51:50.366080 kubelet[2577]: E0702 01:51:50.366045 2577 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6456d768b7-p5gwp" Jul 2 01:51:50.366134 kubelet[2577]: E0702 01:51:50.366103 2577 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6456d768b7-p5gwp_calico-system(87736a6b-5853-42b9-90a8-2fa967051fc1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6456d768b7-p5gwp_calico-system(87736a6b-5853-42b9-90a8-2fa967051fc1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6456d768b7-p5gwp" podUID="87736a6b-5853-42b9-90a8-2fa967051fc1" Jul 2 01:51:50.382578 env[1468]: time="2024-07-02T01:51:50.382527293Z" level=error msg="Failed to destroy network for sandbox \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:50.383078 env[1468]: time="2024-07-02T01:51:50.383047153Z" level=error msg="encountered an error cleaning up failed sandbox \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:50.383219 env[1468]: time="2024-07-02T01:51:50.383190719Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x8j4l,Uid:0a1ebfc4-789b-4005-bedf-61c880e9e47c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:50.383566 kubelet[2577]: E0702 01:51:50.383537 2577 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:50.383641 kubelet[2577]: E0702 01:51:50.383599 2577 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-x8j4l" Jul 2 01:51:50.383641 kubelet[2577]: E0702 01:51:50.383619 2577 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-x8j4l" Jul 2 01:51:50.383695 kubelet[2577]: E0702 01:51:50.383684 2577 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-x8j4l_calico-system(0a1ebfc4-789b-4005-bedf-61c880e9e47c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-x8j4l_calico-system(0a1ebfc4-789b-4005-bedf-61c880e9e47c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-x8j4l" podUID="0a1ebfc4-789b-4005-bedf-61c880e9e47c" Jul 2 01:51:50.387986 env[1468]: time="2024-07-02T01:51:50.387950108Z" level=error msg="Failed to destroy network for sandbox \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:50.388341 env[1468]: time="2024-07-02T01:51:50.388312082Z" level=error msg="encountered an error cleaning up failed sandbox \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:50.388456 env[1468]: time="2024-07-02T01:51:50.388430847Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-6rqtp,Uid:c04d0a21-b743-4537-bbf9-f6bf77a42e92,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:50.388837 kubelet[2577]: E0702 01:51:50.388663 2577 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:50.388837 kubelet[2577]: E0702 01:51:50.388703 2577 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-6rqtp" Jul 2 01:51:50.388837 kubelet[2577]: E0702 01:51:50.388722 2577 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-6rqtp" Jul 2 01:51:50.388973 kubelet[2577]: E0702 01:51:50.388769 2577 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-6rqtp_kube-system(c04d0a21-b743-4537-bbf9-f6bf77a42e92)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-6rqtp_kube-system(c04d0a21-b743-4537-bbf9-f6bf77a42e92)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-6rqtp" podUID="c04d0a21-b743-4537-bbf9-f6bf77a42e92" Jul 2 01:51:50.969194 kubelet[2577]: I0702 01:51:50.968686 2577 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Jul 2 01:51:50.969622 env[1468]: time="2024-07-02T01:51:50.969590480Z" level=info msg="StopPodSandbox for \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\"" Jul 2 01:51:50.972069 kubelet[2577]: I0702 01:51:50.971614 2577 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Jul 2 01:51:50.972336 env[1468]: time="2024-07-02T01:51:50.972299428Z" level=info msg="StopPodSandbox for \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\"" Jul 2 01:51:50.973115 kubelet[2577]: I0702 01:51:50.973097 2577 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Jul 2 01:51:50.973707 env[1468]: time="2024-07-02T01:51:50.973675283Z" level=info msg="StopPodSandbox for \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\"" Jul 2 01:51:50.976740 kubelet[2577]: I0702 01:51:50.976355 2577 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Jul 2 01:51:50.977182 env[1468]: time="2024-07-02T01:51:50.977148701Z" level=info msg="StopPodSandbox for \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\"" Jul 2 01:51:50.983541 env[1468]: time="2024-07-02T01:51:50.983497833Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 01:51:51.039146 env[1468]: time="2024-07-02T01:51:51.039081256Z" level=error msg="StopPodSandbox for \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\" failed" error="failed to destroy network for sandbox \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:51.039701 kubelet[2577]: E0702 01:51:51.039517 2577 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Jul 2 01:51:51.039701 kubelet[2577]: E0702 01:51:51.039593 2577 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3"} Jul 2 01:51:51.039701 kubelet[2577]: E0702 01:51:51.039628 2577 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"87736a6b-5853-42b9-90a8-2fa967051fc1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 01:51:51.039701 kubelet[2577]: E0702 01:51:51.039664 2577 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"87736a6b-5853-42b9-90a8-2fa967051fc1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6456d768b7-p5gwp" podUID="87736a6b-5853-42b9-90a8-2fa967051fc1" Jul 2 01:51:51.053733 env[1468]: time="2024-07-02T01:51:51.053678026Z" level=error msg="StopPodSandbox for \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\" failed" error="failed to destroy network for sandbox \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:51.054310 kubelet[2577]: E0702 01:51:51.054148 2577 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Jul 2 01:51:51.054310 kubelet[2577]: E0702 01:51:51.054199 2577 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06"} Jul 2 01:51:51.054310 kubelet[2577]: E0702 01:51:51.054234 2577 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0a1ebfc4-789b-4005-bedf-61c880e9e47c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 01:51:51.054310 kubelet[2577]: E0702 01:51:51.054273 2577 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0a1ebfc4-789b-4005-bedf-61c880e9e47c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-x8j4l" podUID="0a1ebfc4-789b-4005-bedf-61c880e9e47c" Jul 2 01:51:51.064727 env[1468]: time="2024-07-02T01:51:51.064671456Z" level=error msg="StopPodSandbox for \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\" failed" error="failed to destroy network for sandbox \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:51.065366 kubelet[2577]: E0702 01:51:51.065204 2577 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Jul 2 01:51:51.065366 kubelet[2577]: E0702 01:51:51.065246 2577 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f"} Jul 2 01:51:51.065366 kubelet[2577]: E0702 01:51:51.065290 2577 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c04d0a21-b743-4537-bbf9-f6bf77a42e92\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 01:51:51.065366 kubelet[2577]: E0702 01:51:51.065318 2577 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c04d0a21-b743-4537-bbf9-f6bf77a42e92\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-6rqtp" podUID="c04d0a21-b743-4537-bbf9-f6bf77a42e92" Jul 2 01:51:51.068930 env[1468]: time="2024-07-02T01:51:51.068877140Z" level=error msg="StopPodSandbox for \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\" failed" error="failed to destroy network for sandbox \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:51:51.069424 kubelet[2577]: E0702 01:51:51.069277 2577 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Jul 2 01:51:51.069424 kubelet[2577]: E0702 01:51:51.069327 2577 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9"} Jul 2 01:51:51.069424 kubelet[2577]: E0702 01:51:51.069358 2577 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cd129927-de23-4f7e-818e-a81e909f547e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 01:51:51.069424 kubelet[2577]: E0702 01:51:51.069398 2577 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cd129927-de23-4f7e-818e-a81e909f547e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-mq8sg" podUID="cd129927-de23-4f7e-818e-a81e909f547e" Jul 2 01:51:51.236950 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f-shm.mount: Deactivated successfully. Jul 2 01:51:51.237033 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3-shm.mount: Deactivated successfully. Jul 2 01:51:51.237092 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9-shm.mount: Deactivated successfully. Jul 2 01:51:51.643714 kubelet[2577]: I0702 01:51:51.643528 2577 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 01:51:51.673000 audit[3485]: NETFILTER_CFG table=filter:98 family=2 entries=15 op=nft_register_rule pid=3485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:51.673000 audit[3485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffd2c39270 a2=0 a3=1 items=0 ppid=2755 pid=3485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:51.673000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:51.674000 audit[3485]: NETFILTER_CFG table=nat:99 family=2 entries=19 op=nft_register_chain pid=3485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:51.674000 audit[3485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffd2c39270 a2=0 a3=1 items=0 ppid=2755 pid=3485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:51.674000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:57.163345 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2883001662.mount: Deactivated successfully. Jul 2 01:51:57.213877 env[1468]: time="2024-07-02T01:51:57.213833446Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:57.220554 env[1468]: time="2024-07-02T01:51:57.220526165Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d80cbd636ae2754a08d04558f0436508a17d92258e4712cc4a6299f43497607f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:57.224583 env[1468]: time="2024-07-02T01:51:57.224545429Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:57.228949 env[1468]: time="2024-07-02T01:51:57.228923945Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:57.229291 env[1468]: time="2024-07-02T01:51:57.229264038Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:d80cbd636ae2754a08d04558f0436508a17d92258e4712cc4a6299f43497607f\"" Jul 2 01:51:57.243785 env[1468]: time="2024-07-02T01:51:57.241990533Z" level=info msg="CreateContainer within sandbox \"3c50195d8cbaece3311aa72eff6b6c56580544460d207472d0273d92b481c8a0\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 01:51:57.288177 env[1468]: time="2024-07-02T01:51:57.288133584Z" level=info msg="CreateContainer within sandbox \"3c50195d8cbaece3311aa72eff6b6c56580544460d207472d0273d92b481c8a0\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"51d203fa79ffe8596bb00cd8d734cbc4660338a3fd4989abcc4ab06e94ac0bcd\"" Jul 2 01:51:57.290170 env[1468]: time="2024-07-02T01:51:57.289987450Z" level=info msg="StartContainer for \"51d203fa79ffe8596bb00cd8d734cbc4660338a3fd4989abcc4ab06e94ac0bcd\"" Jul 2 01:51:57.307936 systemd[1]: Started cri-containerd-51d203fa79ffe8596bb00cd8d734cbc4660338a3fd4989abcc4ab06e94ac0bcd.scope. Jul 2 01:51:57.323000 audit[3495]: AVC avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.330274 kernel: kauditd_printk_skb: 40 callbacks suppressed Jul 2 01:51:57.330372 kernel: audit: type=1400 audit(1719885117.323:1001): avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.323000 audit[3495]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3036 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:57.372479 kernel: audit: type=1300 audit(1719885117.323:1001): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3036 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:57.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531643230336661373966666538353936626230306364386437333463 Jul 2 01:51:57.395880 kernel: audit: type=1327 audit(1719885117.323:1001): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531643230336661373966666538353936626230306364386437333463 Jul 2 01:51:57.323000 audit[3495]: AVC avc: denied { bpf } for pid=3495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.412507 kernel: audit: type=1400 audit(1719885117.323:1002): avc: denied { bpf } for pid=3495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.412655 kernel: audit: type=1400 audit(1719885117.323:1002): avc: denied { bpf } for pid=3495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.323000 audit[3495]: AVC avc: denied { bpf } for pid=3495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.323000 audit[3495]: AVC avc: denied { bpf } for pid=3495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.444794 kernel: audit: type=1400 audit(1719885117.323:1002): avc: denied { bpf } for pid=3495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.323000 audit[3495]: AVC avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.464928 kernel: audit: type=1400 audit(1719885117.323:1002): avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.323000 audit[3495]: AVC avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.483691 kernel: audit: type=1400 audit(1719885117.323:1002): avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.323000 audit[3495]: AVC avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.504882 kernel: audit: type=1400 audit(1719885117.323:1002): avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.323000 audit[3495]: AVC avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.521958 kernel: audit: type=1400 audit(1719885117.323:1002): avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.323000 audit[3495]: AVC avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.323000 audit[3495]: AVC avc: denied { bpf } for pid=3495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.323000 audit[3495]: AVC avc: denied { bpf } for pid=3495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.323000 audit: BPF prog-id=137 op=LOAD Jul 2 01:51:57.323000 audit[3495]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3036 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:57.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531643230336661373966666538353936626230306364386437333463 Jul 2 01:51:57.328000 audit[3495]: AVC avc: denied { bpf } for pid=3495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.328000 audit[3495]: AVC avc: denied { bpf } for pid=3495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.328000 audit[3495]: AVC avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.328000 audit[3495]: AVC avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.328000 audit[3495]: AVC avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.328000 audit[3495]: AVC avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.328000 audit[3495]: AVC avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.328000 audit[3495]: AVC avc: denied { bpf } for pid=3495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.328000 audit[3495]: AVC avc: denied { bpf } for pid=3495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.328000 audit: BPF prog-id=138 op=LOAD Jul 2 01:51:57.328000 audit[3495]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3036 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:57.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531643230336661373966666538353936626230306364386437333463 Jul 2 01:51:57.345000 audit: BPF prog-id=138 op=UNLOAD Jul 2 01:51:57.345000 audit: BPF prog-id=137 op=UNLOAD Jul 2 01:51:57.345000 audit[3495]: AVC avc: denied { bpf } for pid=3495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.345000 audit[3495]: AVC avc: denied { bpf } for pid=3495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.345000 audit[3495]: AVC avc: denied { bpf } for pid=3495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.345000 audit[3495]: AVC avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.345000 audit[3495]: AVC avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.345000 audit[3495]: AVC avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.345000 audit[3495]: AVC avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.345000 audit[3495]: AVC avc: denied { perfmon } for pid=3495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.345000 audit[3495]: AVC avc: denied { bpf } for pid=3495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.345000 audit[3495]: AVC avc: denied { bpf } for pid=3495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:57.345000 audit: BPF prog-id=139 op=LOAD Jul 2 01:51:57.345000 audit[3495]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3036 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:57.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531643230336661373966666538353936626230306364386437333463 Jul 2 01:51:57.530077 env[1468]: time="2024-07-02T01:51:57.530027198Z" level=info msg="StartContainer for \"51d203fa79ffe8596bb00cd8d734cbc4660338a3fd4989abcc4ab06e94ac0bcd\" returns successfully" Jul 2 01:51:57.814430 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 01:51:57.814544 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 01:51:58.014914 kubelet[2577]: I0702 01:51:58.014878 2577 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-n8lm8" podStartSLOduration=2.030636233 podCreationTimestamp="2024-07-02 01:51:37 +0000 UTC" firstStartedPulling="2024-07-02 01:51:38.245307861 +0000 UTC m=+22.500963424" lastFinishedPulling="2024-07-02 01:51:57.229512126 +0000 UTC m=+41.485167689" observedRunningTime="2024-07-02 01:51:58.013930105 +0000 UTC m=+42.269585668" watchObservedRunningTime="2024-07-02 01:51:58.014840498 +0000 UTC m=+42.270496021" Jul 2 01:51:59.153000 audit[3649]: AVC avc: denied { write } for pid=3649 comm="tee" name="fd" dev="proc" ino=25676 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:51:59.170000 audit[3657]: AVC avc: denied { write } for pid=3657 comm="tee" name="fd" dev="proc" ino=25687 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:51:59.153000 audit[3649]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe0171a10 a2=241 a3=1b6 items=1 ppid=3603 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.153000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 01:51:59.153000 audit: PATH item=0 name="/dev/fd/63" inode=25659 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:51:59.153000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:51:59.176000 audit[3659]: AVC avc: denied { write } for pid=3659 comm="tee" name="fd" dev="proc" ino=24954 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:51:59.176000 audit[3659]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffebb9a10 a2=241 a3=1b6 items=1 ppid=3607 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.176000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 01:51:59.176000 audit: PATH item=0 name="/dev/fd/63" inode=25671 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:51:59.176000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:51:59.170000 audit[3657]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffa6b5a11 a2=241 a3=1b6 items=1 ppid=3609 pid=3657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.170000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 01:51:59.170000 audit: PATH item=0 name="/dev/fd/63" inode=25668 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:51:59.170000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:51:59.179000 audit[3667]: AVC avc: denied { write } for pid=3667 comm="tee" name="fd" dev="proc" ino=25700 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:51:59.179000 audit[3667]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffac82a10 a2=241 a3=1b6 items=1 ppid=3606 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.179000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 01:51:59.179000 audit: PATH item=0 name="/dev/fd/63" inode=25684 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:51:59.179000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:51:59.189000 audit[3662]: AVC avc: denied { write } for pid=3662 comm="tee" name="fd" dev="proc" ino=25702 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:51:59.189000 audit[3662]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc0743a00 a2=241 a3=1b6 items=1 ppid=3614 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.189000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 01:51:59.189000 audit: PATH item=0 name="/dev/fd/63" inode=24949 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:51:59.189000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:51:59.200000 audit[3673]: AVC avc: denied { write } for pid=3673 comm="tee" name="fd" dev="proc" ino=25706 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:51:59.200000 audit[3673]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc53faa12 a2=241 a3=1b6 items=1 ppid=3611 pid=3673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.200000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 01:51:59.200000 audit: PATH item=0 name="/dev/fd/63" inode=24956 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:51:59.200000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:51:59.221000 audit[3677]: AVC avc: denied { write } for pid=3677 comm="tee" name="fd" dev="proc" ino=24963 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:51:59.221000 audit[3677]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd395ba01 a2=241 a3=1b6 items=1 ppid=3617 pid=3677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.221000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 01:51:59.221000 audit: PATH item=0 name="/dev/fd/63" inode=24960 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:51:59.221000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit: BPF prog-id=140 op=LOAD Jul 2 01:51:59.498000 audit[3742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdd44fa08 a2=70 a3=ffffdd44fa78 items=0 ppid=3608 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.498000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:51:59.498000 audit: BPF prog-id=140 op=UNLOAD Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit: BPF prog-id=141 op=LOAD Jul 2 01:51:59.498000 audit[3742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdd44fa08 a2=70 a3=4b243c items=0 ppid=3608 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.498000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:51:59.498000 audit: BPF prog-id=141 op=UNLOAD Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffdd44f9c0 a2=70 a3=ffffdd44fa30 items=0 ppid=3608 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.498000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit: BPF prog-id=142 op=LOAD Jul 2 01:51:59.498000 audit[3742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffdd44f9a8 a2=70 a3=ffffdd44fa18 items=0 ppid=3608 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.498000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:51:59.498000 audit: BPF prog-id=142 op=UNLOAD Jul 2 01:51:59.498000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.498000 audit[3742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdd44fa78 a2=70 a3=0 items=0 ppid=3608 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.498000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:51:59.499000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.499000 audit[3742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdd44fa68 a2=70 a3=0 items=0 ppid=3608 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.499000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:51:59.499000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.499000 audit[3742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdd44f9d8 a2=70 a3=0 items=0 ppid=3608 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.499000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:51:59.499000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.499000 audit[3742]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffdd44fab0 a2=70 a3=37e9848f items=0 ppid=3608 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.499000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:51:59.505000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.505000 audit[3742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdd44fab0 a2=70 a3=37e9848f items=0 ppid=3608 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.505000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:51:59.505000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.505000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.505000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.505000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.505000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.505000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.505000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.505000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.505000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.505000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.505000 audit: BPF prog-id=143 op=LOAD Jul 2 01:51:59.505000 audit[3742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdd44f9d8 a2=70 a3=37e984a9 items=0 ppid=3608 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.505000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:51:59.502921 systemd-networkd[1605]: vxlan.calico: Link UP Jul 2 01:51:59.502925 systemd-networkd[1605]: vxlan.calico: Gained carrier Jul 2 01:51:59.516000 audit[3748]: AVC avc: denied { bpf } for pid=3748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.516000 audit[3748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd9ea6a08 a2=70 a3=ffffd9ea6a78 items=0 ppid=3608 pid=3748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.516000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 01:51:59.516000 audit[3748]: AVC avc: denied { bpf } for pid=3748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.516000 audit[3748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd9ea68d8 a2=70 a3=ffffd9ea6948 items=0 ppid=3608 pid=3748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.516000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 01:51:59.524000 audit: BPF prog-id=143 op=UNLOAD Jul 2 01:51:59.757000 audit[3773]: NETFILTER_CFG table=mangle:100 family=2 entries=16 op=nft_register_chain pid=3773 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:51:59.757000 audit[3773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffff3894920 a2=0 a3=ffffa9a84fa8 items=0 ppid=3608 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.757000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:51:59.779000 audit[3771]: NETFILTER_CFG table=raw:101 family=2 entries=19 op=nft_register_chain pid=3771 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:51:59.779000 audit[3771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=fffff6766100 a2=0 a3=ffff9aed4fa8 items=0 ppid=3608 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.779000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:51:59.813000 audit[3772]: NETFILTER_CFG table=nat:102 family=2 entries=15 op=nft_register_chain pid=3772 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:51:59.814000 audit[3774]: NETFILTER_CFG table=filter:103 family=2 entries=39 op=nft_register_chain pid=3774 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:51:59.814000 audit[3774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffc839ffe0 a2=0 a3=ffffa9e10fa8 items=0 ppid=3608 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.814000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:51:59.813000 audit[3772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffcb84a440 a2=0 a3=ffffa36e7fa8 items=0 ppid=3608 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.813000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:01.308958 systemd-networkd[1605]: vxlan.calico: Gained IPv6LL Jul 2 01:52:01.833276 env[1468]: time="2024-07-02T01:52:01.833230539Z" level=info msg="StopPodSandbox for \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\"" Jul 2 01:52:01.908172 env[1468]: 2024-07-02 01:52:01.874 [INFO][3802] k8s.go 608: Cleaning up netns ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Jul 2 01:52:01.908172 env[1468]: 2024-07-02 01:52:01.875 [INFO][3802] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" iface="eth0" netns="/var/run/netns/cni-4cb8e880-213a-4dad-bb6d-03dde0fe35d8" Jul 2 01:52:01.908172 env[1468]: 2024-07-02 01:52:01.875 [INFO][3802] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" iface="eth0" netns="/var/run/netns/cni-4cb8e880-213a-4dad-bb6d-03dde0fe35d8" Jul 2 01:52:01.908172 env[1468]: 2024-07-02 01:52:01.875 [INFO][3802] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" iface="eth0" netns="/var/run/netns/cni-4cb8e880-213a-4dad-bb6d-03dde0fe35d8" Jul 2 01:52:01.908172 env[1468]: 2024-07-02 01:52:01.875 [INFO][3802] k8s.go 615: Releasing IP address(es) ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Jul 2 01:52:01.908172 env[1468]: 2024-07-02 01:52:01.875 [INFO][3802] utils.go 188: Calico CNI releasing IP address ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Jul 2 01:52:01.908172 env[1468]: 2024-07-02 01:52:01.895 [INFO][3808] ipam_plugin.go 411: Releasing address using handleID ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" HandleID="k8s-pod-network.d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" Jul 2 01:52:01.908172 env[1468]: 2024-07-02 01:52:01.895 [INFO][3808] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:01.908172 env[1468]: 2024-07-02 01:52:01.896 [INFO][3808] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:01.908172 env[1468]: 2024-07-02 01:52:01.904 [WARNING][3808] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" HandleID="k8s-pod-network.d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" Jul 2 01:52:01.908172 env[1468]: 2024-07-02 01:52:01.904 [INFO][3808] ipam_plugin.go 439: Releasing address using workloadID ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" HandleID="k8s-pod-network.d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" Jul 2 01:52:01.908172 env[1468]: 2024-07-02 01:52:01.905 [INFO][3808] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:01.908172 env[1468]: 2024-07-02 01:52:01.906 [INFO][3802] k8s.go 621: Teardown processing complete. ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Jul 2 01:52:01.912112 systemd[1]: run-netns-cni\x2d4cb8e880\x2d213a\x2d4dad\x2dbb6d\x2d03dde0fe35d8.mount: Deactivated successfully. Jul 2 01:52:01.913259 env[1468]: time="2024-07-02T01:52:01.913212771Z" level=info msg="TearDown network for sandbox \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\" successfully" Jul 2 01:52:01.913393 env[1468]: time="2024-07-02T01:52:01.913326574Z" level=info msg="StopPodSandbox for \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\" returns successfully" Jul 2 01:52:01.914086 env[1468]: time="2024-07-02T01:52:01.914060239Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-mq8sg,Uid:cd129927-de23-4f7e-818e-a81e909f547e,Namespace:kube-system,Attempt:1,}" Jul 2 01:52:03.151155 systemd-networkd[1605]: cali20423fd05de: Link UP Jul 2 01:52:03.159856 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali20423fd05de: link becomes ready Jul 2 01:52:03.160912 systemd-networkd[1605]: cali20423fd05de: Gained carrier Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.090 [INFO][3814] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0 coredns-5dd5756b68- kube-system cd129927-de23-4f7e-818e-a81e909f547e 707 0 2024-07-02 01:51:30 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.5-a-6c47a6a388 coredns-5dd5756b68-mq8sg eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali20423fd05de [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" Namespace="kube-system" Pod="coredns-5dd5756b68-mq8sg" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-" Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.090 [INFO][3814] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" Namespace="kube-system" Pod="coredns-5dd5756b68-mq8sg" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.116 [INFO][3826] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" HandleID="k8s-pod-network.48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.127 [INFO][3826] ipam_plugin.go 264: Auto assigning IP ContainerID="48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" HandleID="k8s-pod-network.48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003182b0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.5-a-6c47a6a388", "pod":"coredns-5dd5756b68-mq8sg", "timestamp":"2024-07-02 01:52:03.116863438 +0000 UTC"}, Hostname:"ci-3510.3.5-a-6c47a6a388", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.127 [INFO][3826] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.127 [INFO][3826] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.127 [INFO][3826] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-6c47a6a388' Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.129 [INFO][3826] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.132 [INFO][3826] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.135 [INFO][3826] ipam.go 489: Trying affinity for 192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.137 [INFO][3826] ipam.go 155: Attempting to load block cidr=192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.139 [INFO][3826] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.139 [INFO][3826] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.118.192/26 handle="k8s-pod-network.48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.140 [INFO][3826] ipam.go 1685: Creating new handle: k8s-pod-network.48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8 Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.143 [INFO][3826] ipam.go 1203: Writing block in order to claim IPs block=192.168.118.192/26 handle="k8s-pod-network.48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.147 [INFO][3826] ipam.go 1216: Successfully claimed IPs: [192.168.118.193/26] block=192.168.118.192/26 handle="k8s-pod-network.48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.147 [INFO][3826] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.118.193/26] handle="k8s-pod-network.48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.147 [INFO][3826] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:03.181732 env[1468]: 2024-07-02 01:52:03.147 [INFO][3826] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.118.193/26] IPv6=[] ContainerID="48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" HandleID="k8s-pod-network.48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" Jul 2 01:52:03.182459 env[1468]: 2024-07-02 01:52:03.149 [INFO][3814] k8s.go 386: Populated endpoint ContainerID="48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" Namespace="kube-system" Pod="coredns-5dd5756b68-mq8sg" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"cd129927-de23-4f7e-818e-a81e909f547e", ResourceVersion:"707", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"", Pod:"coredns-5dd5756b68-mq8sg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.118.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali20423fd05de", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:03.182459 env[1468]: 2024-07-02 01:52:03.149 [INFO][3814] k8s.go 387: Calico CNI using IPs: [192.168.118.193/32] ContainerID="48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" Namespace="kube-system" Pod="coredns-5dd5756b68-mq8sg" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" Jul 2 01:52:03.182459 env[1468]: 2024-07-02 01:52:03.150 [INFO][3814] dataplane_linux.go 68: Setting the host side veth name to cali20423fd05de ContainerID="48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" Namespace="kube-system" Pod="coredns-5dd5756b68-mq8sg" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" Jul 2 01:52:03.182459 env[1468]: 2024-07-02 01:52:03.151 [INFO][3814] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" Namespace="kube-system" Pod="coredns-5dd5756b68-mq8sg" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" Jul 2 01:52:03.182459 env[1468]: 2024-07-02 01:52:03.166 [INFO][3814] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" Namespace="kube-system" Pod="coredns-5dd5756b68-mq8sg" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"cd129927-de23-4f7e-818e-a81e909f547e", ResourceVersion:"707", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8", Pod:"coredns-5dd5756b68-mq8sg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.118.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali20423fd05de", MAC:"06:ea:9f:62:97:46", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:03.182459 env[1468]: 2024-07-02 01:52:03.176 [INFO][3814] k8s.go 500: Wrote updated endpoint to datastore ContainerID="48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8" Namespace="kube-system" Pod="coredns-5dd5756b68-mq8sg" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" Jul 2 01:52:03.189000 audit[3844]: NETFILTER_CFG table=filter:104 family=2 entries=34 op=nft_register_chain pid=3844 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:52:03.195325 kernel: kauditd_printk_skb: 157 callbacks suppressed Jul 2 01:52:03.195391 kernel: audit: type=1325 audit(1719885123.189:1034): table=filter:104 family=2 entries=34 op=nft_register_chain pid=3844 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:52:03.189000 audit[3844]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffe2464cb0 a2=0 a3=ffffa94c3fa8 items=0 ppid=3608 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:03.220323 env[1468]: time="2024-07-02T01:52:03.220264335Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:52:03.220514 env[1468]: time="2024-07-02T01:52:03.220490103Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:52:03.220635 env[1468]: time="2024-07-02T01:52:03.220593906Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:52:03.220985 env[1468]: time="2024-07-02T01:52:03.220951478Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8 pid=3857 runtime=io.containerd.runc.v2 Jul 2 01:52:03.235245 kernel: audit: type=1300 audit(1719885123.189:1034): arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffe2464cb0 a2=0 a3=ffffa94c3fa8 items=0 ppid=3608 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:03.264717 kernel: audit: type=1327 audit(1719885123.189:1034): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:03.189000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:03.263556 systemd[1]: Started cri-containerd-48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8.scope. Jul 2 01:52:03.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.310066 kernel: audit: type=1400 audit(1719885123.276:1035): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.310167 kernel: audit: type=1400 audit(1719885123.276:1036): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.310200 kernel: audit: type=1400 audit(1719885123.276:1037): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.325998 kernel: audit: type=1400 audit(1719885123.276:1038): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.358949 kernel: audit: type=1400 audit(1719885123.276:1039): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.359038 kernel: audit: type=1400 audit(1719885123.276:1040): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.391780 kernel: audit: type=1400 audit(1719885123.276:1041): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.276000 audit: BPF prog-id=144 op=LOAD Jul 2 01:52:03.277000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.277000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3857 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:03.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438313935616132623364613930643461316639333730666633376263 Jul 2 01:52:03.277000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.277000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3857 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:03.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438313935616132623364613930643461316639333730666633376263 Jul 2 01:52:03.277000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.277000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.277000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.277000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.277000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.277000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.277000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.277000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.277000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.277000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.277000 audit: BPF prog-id=145 op=LOAD Jul 2 01:52:03.277000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3857 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:03.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438313935616132623364613930643461316639333730666633376263 Jul 2 01:52:03.293000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.293000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.293000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.293000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.293000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.293000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.293000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.293000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.293000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.293000 audit: BPF prog-id=146 op=LOAD Jul 2 01:52:03.293000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3857 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:03.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438313935616132623364613930643461316639333730666633376263 Jul 2 01:52:03.309000 audit: BPF prog-id=146 op=UNLOAD Jul 2 01:52:03.309000 audit: BPF prog-id=145 op=UNLOAD Jul 2 01:52:03.309000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.309000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.309000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.309000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.309000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.309000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.309000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.309000 audit[3868]: AVC avc: denied { perfmon } for pid=3868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.309000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.309000 audit[3868]: AVC avc: denied { bpf } for pid=3868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.309000 audit: BPF prog-id=147 op=LOAD Jul 2 01:52:03.309000 audit[3868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3857 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:03.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438313935616132623364613930643461316639333730666633376263 Jul 2 01:52:03.406257 env[1468]: time="2024-07-02T01:52:03.404059808Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-mq8sg,Uid:cd129927-de23-4f7e-818e-a81e909f547e,Namespace:kube-system,Attempt:1,} returns sandbox id \"48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8\"" Jul 2 01:52:03.410782 env[1468]: time="2024-07-02T01:52:03.410751389Z" level=info msg="CreateContainer within sandbox \"48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 01:52:03.451314 env[1468]: time="2024-07-02T01:52:03.451279569Z" level=info msg="CreateContainer within sandbox \"48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"db5ba3ee0ea2a9fabd5342f7ac743ca8dca8d96d5c6bf179604b1472f8e70d37\"" Jul 2 01:52:03.452008 env[1468]: time="2024-07-02T01:52:03.451983272Z" level=info msg="StartContainer for \"db5ba3ee0ea2a9fabd5342f7ac743ca8dca8d96d5c6bf179604b1472f8e70d37\"" Jul 2 01:52:03.471767 systemd[1]: Started cri-containerd-db5ba3ee0ea2a9fabd5342f7ac743ca8dca8d96d5c6bf179604b1472f8e70d37.scope. Jul 2 01:52:03.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.485000 audit: BPF prog-id=148 op=LOAD Jul 2 01:52:03.486000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.486000 audit[3900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3857 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:03.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462356261336565306561326139666162643533343266376163373433 Jul 2 01:52:03.487000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.487000 audit[3900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3857 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:03.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462356261336565306561326139666162643533343266376163373433 Jul 2 01:52:03.487000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.487000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.487000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.487000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.487000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.487000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.487000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.487000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.487000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.487000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.487000 audit: BPF prog-id=149 op=LOAD Jul 2 01:52:03.487000 audit[3900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3857 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:03.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462356261336565306561326139666162643533343266376163373433 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit: BPF prog-id=150 op=LOAD Jul 2 01:52:03.488000 audit[3900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3857 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:03.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462356261336565306561326139666162643533343266376163373433 Jul 2 01:52:03.488000 audit: BPF prog-id=150 op=UNLOAD Jul 2 01:52:03.488000 audit: BPF prog-id=149 op=UNLOAD Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:03.488000 audit: BPF prog-id=151 op=LOAD Jul 2 01:52:03.488000 audit[3900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3857 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:03.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462356261336565306561326139666162643533343266376163373433 Jul 2 01:52:03.510195 env[1468]: time="2024-07-02T01:52:03.510145354Z" level=info msg="StartContainer for \"db5ba3ee0ea2a9fabd5342f7ac743ca8dca8d96d5c6bf179604b1472f8e70d37\" returns successfully" Jul 2 01:52:04.016642 kubelet[2577]: I0702 01:52:04.016599 2577 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-mq8sg" podStartSLOduration=34.016564121 podCreationTimestamp="2024-07-02 01:51:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 01:52:04.015638851 +0000 UTC m=+48.271294374" watchObservedRunningTime="2024-07-02 01:52:04.016564121 +0000 UTC m=+48.272219684" Jul 2 01:52:04.032000 audit[3932]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3932 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:04.032000 audit[3932]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffff5d1b30 a2=0 a3=1 items=0 ppid=2755 pid=3932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:04.032000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:04.037000 audit[3932]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=3932 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:04.037000 audit[3932]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffff5d1b30 a2=0 a3=1 items=0 ppid=2755 pid=3932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:04.037000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:04.043000 audit[3934]: NETFILTER_CFG table=filter:107 family=2 entries=11 op=nft_register_rule pid=3934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:04.043000 audit[3934]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff56b2080 a2=0 a3=1 items=0 ppid=2755 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:04.043000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:04.044000 audit[3934]: NETFILTER_CFG table=nat:108 family=2 entries=35 op=nft_register_chain pid=3934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:04.044000 audit[3934]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=fffff56b2080 a2=0 a3=1 items=0 ppid=2755 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:04.044000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:04.830016 systemd-networkd[1605]: cali20423fd05de: Gained IPv6LL Jul 2 01:52:04.832146 env[1468]: time="2024-07-02T01:52:04.832108977Z" level=info msg="StopPodSandbox for \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\"" Jul 2 01:52:04.903512 env[1468]: 2024-07-02 01:52:04.873 [INFO][3957] k8s.go 608: Cleaning up netns ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Jul 2 01:52:04.903512 env[1468]: 2024-07-02 01:52:04.873 [INFO][3957] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" iface="eth0" netns="/var/run/netns/cni-b6d06ba4-9ed8-10ae-57bc-fa43a3a5ad4e" Jul 2 01:52:04.903512 env[1468]: 2024-07-02 01:52:04.874 [INFO][3957] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" iface="eth0" netns="/var/run/netns/cni-b6d06ba4-9ed8-10ae-57bc-fa43a3a5ad4e" Jul 2 01:52:04.903512 env[1468]: 2024-07-02 01:52:04.874 [INFO][3957] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" iface="eth0" netns="/var/run/netns/cni-b6d06ba4-9ed8-10ae-57bc-fa43a3a5ad4e" Jul 2 01:52:04.903512 env[1468]: 2024-07-02 01:52:04.874 [INFO][3957] k8s.go 615: Releasing IP address(es) ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Jul 2 01:52:04.903512 env[1468]: 2024-07-02 01:52:04.874 [INFO][3957] utils.go 188: Calico CNI releasing IP address ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Jul 2 01:52:04.903512 env[1468]: 2024-07-02 01:52:04.892 [INFO][3963] ipam_plugin.go 411: Releasing address using handleID ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" HandleID="k8s-pod-network.a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" Jul 2 01:52:04.903512 env[1468]: 2024-07-02 01:52:04.892 [INFO][3963] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:04.903512 env[1468]: 2024-07-02 01:52:04.892 [INFO][3963] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:04.903512 env[1468]: 2024-07-02 01:52:04.900 [WARNING][3963] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" HandleID="k8s-pod-network.a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" Jul 2 01:52:04.903512 env[1468]: 2024-07-02 01:52:04.900 [INFO][3963] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" HandleID="k8s-pod-network.a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" Jul 2 01:52:04.903512 env[1468]: 2024-07-02 01:52:04.901 [INFO][3963] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:04.903512 env[1468]: 2024-07-02 01:52:04.902 [INFO][3957] k8s.go 621: Teardown processing complete. ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Jul 2 01:52:04.906342 systemd[1]: run-netns-cni\x2db6d06ba4\x2d9ed8\x2d10ae\x2d57bc\x2dfa43a3a5ad4e.mount: Deactivated successfully. Jul 2 01:52:04.907986 env[1468]: time="2024-07-02T01:52:04.907854249Z" level=info msg="TearDown network for sandbox \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\" successfully" Jul 2 01:52:04.907986 env[1468]: time="2024-07-02T01:52:04.907891330Z" level=info msg="StopPodSandbox for \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\" returns successfully" Jul 2 01:52:04.908734 env[1468]: time="2024-07-02T01:52:04.908701717Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6456d768b7-p5gwp,Uid:87736a6b-5853-42b9-90a8-2fa967051fc1,Namespace:calico-system,Attempt:1,}" Jul 2 01:52:05.056043 systemd-networkd[1605]: calicf6ca055468: Link UP Jul 2 01:52:05.068927 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:52:05.069024 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicf6ca055468: link becomes ready Jul 2 01:52:05.070068 systemd-networkd[1605]: calicf6ca055468: Gained carrier Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:04.982 [INFO][3969] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0 calico-kube-controllers-6456d768b7- calico-system 87736a6b-5853-42b9-90a8-2fa967051fc1 730 0 2024-07-02 01:51:37 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6456d768b7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.5-a-6c47a6a388 calico-kube-controllers-6456d768b7-p5gwp eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calicf6ca055468 [] []}} ContainerID="46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" Namespace="calico-system" Pod="calico-kube-controllers-6456d768b7-p5gwp" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-" Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:04.983 [INFO][3969] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" Namespace="calico-system" Pod="calico-kube-controllers-6456d768b7-p5gwp" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:05.015 [INFO][3981] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" HandleID="k8s-pod-network.46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:05.028 [INFO][3981] ipam_plugin.go 264: Auto assigning IP ContainerID="46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" HandleID="k8s-pod-network.46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002efdc0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.5-a-6c47a6a388", "pod":"calico-kube-controllers-6456d768b7-p5gwp", "timestamp":"2024-07-02 01:52:05.015144265 +0000 UTC"}, Hostname:"ci-3510.3.5-a-6c47a6a388", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:05.028 [INFO][3981] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:05.028 [INFO][3981] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:05.028 [INFO][3981] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-6c47a6a388' Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:05.029 [INFO][3981] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:05.033 [INFO][3981] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:05.036 [INFO][3981] ipam.go 489: Trying affinity for 192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:05.038 [INFO][3981] ipam.go 155: Attempting to load block cidr=192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:05.040 [INFO][3981] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:05.040 [INFO][3981] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.118.192/26 handle="k8s-pod-network.46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:05.041 [INFO][3981] ipam.go 1685: Creating new handle: k8s-pod-network.46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7 Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:05.045 [INFO][3981] ipam.go 1203: Writing block in order to claim IPs block=192.168.118.192/26 handle="k8s-pod-network.46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:05.051 [INFO][3981] ipam.go 1216: Successfully claimed IPs: [192.168.118.194/26] block=192.168.118.192/26 handle="k8s-pod-network.46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:05.051 [INFO][3981] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.118.194/26] handle="k8s-pod-network.46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:05.051 [INFO][3981] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:05.081152 env[1468]: 2024-07-02 01:52:05.051 [INFO][3981] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.118.194/26] IPv6=[] ContainerID="46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" HandleID="k8s-pod-network.46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" Jul 2 01:52:05.081754 env[1468]: 2024-07-02 01:52:05.053 [INFO][3969] k8s.go 386: Populated endpoint ContainerID="46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" Namespace="calico-system" Pod="calico-kube-controllers-6456d768b7-p5gwp" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0", GenerateName:"calico-kube-controllers-6456d768b7-", Namespace:"calico-system", SelfLink:"", UID:"87736a6b-5853-42b9-90a8-2fa967051fc1", ResourceVersion:"730", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6456d768b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"", Pod:"calico-kube-controllers-6456d768b7-p5gwp", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.118.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicf6ca055468", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:05.081754 env[1468]: 2024-07-02 01:52:05.053 [INFO][3969] k8s.go 387: Calico CNI using IPs: [192.168.118.194/32] ContainerID="46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" Namespace="calico-system" Pod="calico-kube-controllers-6456d768b7-p5gwp" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" Jul 2 01:52:05.081754 env[1468]: 2024-07-02 01:52:05.053 [INFO][3969] dataplane_linux.go 68: Setting the host side veth name to calicf6ca055468 ContainerID="46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" Namespace="calico-system" Pod="calico-kube-controllers-6456d768b7-p5gwp" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" Jul 2 01:52:05.081754 env[1468]: 2024-07-02 01:52:05.071 [INFO][3969] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" Namespace="calico-system" Pod="calico-kube-controllers-6456d768b7-p5gwp" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" Jul 2 01:52:05.081754 env[1468]: 2024-07-02 01:52:05.071 [INFO][3969] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" Namespace="calico-system" Pod="calico-kube-controllers-6456d768b7-p5gwp" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0", GenerateName:"calico-kube-controllers-6456d768b7-", Namespace:"calico-system", SelfLink:"", UID:"87736a6b-5853-42b9-90a8-2fa967051fc1", ResourceVersion:"730", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6456d768b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7", Pod:"calico-kube-controllers-6456d768b7-p5gwp", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.118.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicf6ca055468", MAC:"46:37:ed:31:48:d3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:05.081754 env[1468]: 2024-07-02 01:52:05.079 [INFO][3969] k8s.go 500: Wrote updated endpoint to datastore ContainerID="46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7" Namespace="calico-system" Pod="calico-kube-controllers-6456d768b7-p5gwp" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" Jul 2 01:52:05.095000 audit[4002]: NETFILTER_CFG table=filter:109 family=2 entries=38 op=nft_register_chain pid=4002 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:52:05.095000 audit[4002]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=ffffd6d0de40 a2=0 a3=ffffa5bf5fa8 items=0 ppid=3608 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:05.095000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:05.099755 env[1468]: time="2024-07-02T01:52:05.099684831Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:52:05.099923 env[1468]: time="2024-07-02T01:52:05.099765113Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:52:05.099923 env[1468]: time="2024-07-02T01:52:05.099790954Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:52:05.100079 env[1468]: time="2024-07-02T01:52:05.100045322Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7 pid=4010 runtime=io.containerd.runc.v2 Jul 2 01:52:05.118035 systemd[1]: Started cri-containerd-46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7.scope. Jul 2 01:52:05.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit: BPF prog-id=152 op=LOAD Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=4010 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:05.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436313639626666396566316334373464633335356338646336363866 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=4010 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:05.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436313639626666396566316334373464633335356338646336363866 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit: BPF prog-id=153 op=LOAD Jul 2 01:52:05.130000 audit[4021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=4010 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:05.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436313639626666396566316334373464633335356338646336363866 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit: BPF prog-id=154 op=LOAD Jul 2 01:52:05.130000 audit[4021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=4010 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:05.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436313639626666396566316334373464633335356338646336363866 Jul 2 01:52:05.130000 audit: BPF prog-id=154 op=UNLOAD Jul 2 01:52:05.130000 audit: BPF prog-id=153 op=UNLOAD Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:05.130000 audit: BPF prog-id=155 op=LOAD Jul 2 01:52:05.130000 audit[4021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=4010 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:05.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436313639626666396566316334373464633335356338646336363866 Jul 2 01:52:05.150837 env[1468]: time="2024-07-02T01:52:05.150773998Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6456d768b7-p5gwp,Uid:87736a6b-5853-42b9-90a8-2fa967051fc1,Namespace:calico-system,Attempt:1,} returns sandbox id \"46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7\"" Jul 2 01:52:05.152852 env[1468]: time="2024-07-02T01:52:05.152348128Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\"" Jul 2 01:52:05.832670 env[1468]: time="2024-07-02T01:52:05.832634902Z" level=info msg="StopPodSandbox for \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\"" Jul 2 01:52:05.833840 env[1468]: time="2024-07-02T01:52:05.833717657Z" level=info msg="StopPodSandbox for \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\"" Jul 2 01:52:05.942201 env[1468]: 2024-07-02 01:52:05.887 [INFO][4072] k8s.go 608: Cleaning up netns ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Jul 2 01:52:05.942201 env[1468]: 2024-07-02 01:52:05.887 [INFO][4072] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" iface="eth0" netns="/var/run/netns/cni-96d36303-3e96-022f-04d6-455c9d786d90" Jul 2 01:52:05.942201 env[1468]: 2024-07-02 01:52:05.887 [INFO][4072] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" iface="eth0" netns="/var/run/netns/cni-96d36303-3e96-022f-04d6-455c9d786d90" Jul 2 01:52:05.942201 env[1468]: 2024-07-02 01:52:05.887 [INFO][4072] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" iface="eth0" netns="/var/run/netns/cni-96d36303-3e96-022f-04d6-455c9d786d90" Jul 2 01:52:05.942201 env[1468]: 2024-07-02 01:52:05.887 [INFO][4072] k8s.go 615: Releasing IP address(es) ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Jul 2 01:52:05.942201 env[1468]: 2024-07-02 01:52:05.887 [INFO][4072] utils.go 188: Calico CNI releasing IP address ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Jul 2 01:52:05.942201 env[1468]: 2024-07-02 01:52:05.928 [INFO][4083] ipam_plugin.go 411: Releasing address using handleID ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" HandleID="k8s-pod-network.be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Workload="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" Jul 2 01:52:05.942201 env[1468]: 2024-07-02 01:52:05.928 [INFO][4083] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:05.942201 env[1468]: 2024-07-02 01:52:05.929 [INFO][4083] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:05.942201 env[1468]: 2024-07-02 01:52:05.937 [WARNING][4083] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" HandleID="k8s-pod-network.be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Workload="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" Jul 2 01:52:05.942201 env[1468]: 2024-07-02 01:52:05.937 [INFO][4083] ipam_plugin.go 439: Releasing address using workloadID ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" HandleID="k8s-pod-network.be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Workload="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" Jul 2 01:52:05.942201 env[1468]: 2024-07-02 01:52:05.939 [INFO][4083] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:05.942201 env[1468]: 2024-07-02 01:52:05.941 [INFO][4072] k8s.go 621: Teardown processing complete. ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Jul 2 01:52:05.944448 systemd[1]: run-netns-cni\x2d96d36303\x2d3e96\x2d022f\x2d04d6\x2d455c9d786d90.mount: Deactivated successfully. Jul 2 01:52:05.947154 env[1468]: time="2024-07-02T01:52:05.947111313Z" level=info msg="TearDown network for sandbox \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\" successfully" Jul 2 01:52:05.947154 env[1468]: time="2024-07-02T01:52:05.947154074Z" level=info msg="StopPodSandbox for \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\" returns successfully" Jul 2 01:52:05.947971 env[1468]: time="2024-07-02T01:52:05.947931699Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x8j4l,Uid:0a1ebfc4-789b-4005-bedf-61c880e9e47c,Namespace:calico-system,Attempt:1,}" Jul 2 01:52:05.975350 env[1468]: 2024-07-02 01:52:05.907 [INFO][4073] k8s.go 608: Cleaning up netns ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Jul 2 01:52:05.975350 env[1468]: 2024-07-02 01:52:05.907 [INFO][4073] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" iface="eth0" netns="/var/run/netns/cni-756f0404-ee80-3356-cc57-f508c3386954" Jul 2 01:52:05.975350 env[1468]: 2024-07-02 01:52:05.908 [INFO][4073] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" iface="eth0" netns="/var/run/netns/cni-756f0404-ee80-3356-cc57-f508c3386954" Jul 2 01:52:05.975350 env[1468]: 2024-07-02 01:52:05.908 [INFO][4073] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" iface="eth0" netns="/var/run/netns/cni-756f0404-ee80-3356-cc57-f508c3386954" Jul 2 01:52:05.975350 env[1468]: 2024-07-02 01:52:05.908 [INFO][4073] k8s.go 615: Releasing IP address(es) ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Jul 2 01:52:05.975350 env[1468]: 2024-07-02 01:52:05.908 [INFO][4073] utils.go 188: Calico CNI releasing IP address ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Jul 2 01:52:05.975350 env[1468]: 2024-07-02 01:52:05.954 [INFO][4088] ipam_plugin.go 411: Releasing address using handleID ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" HandleID="k8s-pod-network.3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" Jul 2 01:52:05.975350 env[1468]: 2024-07-02 01:52:05.954 [INFO][4088] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:05.975350 env[1468]: 2024-07-02 01:52:05.954 [INFO][4088] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:05.975350 env[1468]: 2024-07-02 01:52:05.969 [WARNING][4088] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" HandleID="k8s-pod-network.3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" Jul 2 01:52:05.975350 env[1468]: 2024-07-02 01:52:05.969 [INFO][4088] ipam_plugin.go 439: Releasing address using workloadID ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" HandleID="k8s-pod-network.3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" Jul 2 01:52:05.975350 env[1468]: 2024-07-02 01:52:05.970 [INFO][4088] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:05.975350 env[1468]: 2024-07-02 01:52:05.974 [INFO][4073] k8s.go 621: Teardown processing complete. ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Jul 2 01:52:05.977627 systemd[1]: run-netns-cni\x2d756f0404\x2dee80\x2d3356\x2dcc57\x2df508c3386954.mount: Deactivated successfully. Jul 2 01:52:05.979878 env[1468]: time="2024-07-02T01:52:05.978927458Z" level=info msg="TearDown network for sandbox \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\" successfully" Jul 2 01:52:05.979878 env[1468]: time="2024-07-02T01:52:05.978970300Z" level=info msg="StopPodSandbox for \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\" returns successfully" Jul 2 01:52:05.980308 env[1468]: time="2024-07-02T01:52:05.980278742Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-6rqtp,Uid:c04d0a21-b743-4537-bbf9-f6bf77a42e92,Namespace:kube-system,Attempt:1,}" Jul 2 01:52:06.133525 systemd-networkd[1605]: calia76ccec04d0: Link UP Jul 2 01:52:06.145849 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:52:06.146002 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia76ccec04d0: link becomes ready Jul 2 01:52:06.147305 systemd-networkd[1605]: calia76ccec04d0: Gained carrier Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.050 [INFO][4096] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0 csi-node-driver- calico-system 0a1ebfc4-789b-4005-bedf-61c880e9e47c 738 0 2024-07-02 01:51:37 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7d7f6c786c k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.5-a-6c47a6a388 csi-node-driver-x8j4l eth0 default [] [] [kns.calico-system ksa.calico-system.default] calia76ccec04d0 [] []}} ContainerID="7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" Namespace="calico-system" Pod="csi-node-driver-x8j4l" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-" Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.050 [INFO][4096] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" Namespace="calico-system" Pod="csi-node-driver-x8j4l" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.085 [INFO][4119] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" HandleID="k8s-pod-network.7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" Workload="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.101 [INFO][4119] ipam_plugin.go 264: Auto assigning IP ContainerID="7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" HandleID="k8s-pod-network.7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" Workload="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400059fcd0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.5-a-6c47a6a388", "pod":"csi-node-driver-x8j4l", "timestamp":"2024-07-02 01:52:06.08574563 +0000 UTC"}, Hostname:"ci-3510.3.5-a-6c47a6a388", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.101 [INFO][4119] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.101 [INFO][4119] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.101 [INFO][4119] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-6c47a6a388' Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.103 [INFO][4119] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.110 [INFO][4119] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.114 [INFO][4119] ipam.go 489: Trying affinity for 192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.116 [INFO][4119] ipam.go 155: Attempting to load block cidr=192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.119 [INFO][4119] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.119 [INFO][4119] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.118.192/26 handle="k8s-pod-network.7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.120 [INFO][4119] ipam.go 1685: Creating new handle: k8s-pod-network.7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.123 [INFO][4119] ipam.go 1203: Writing block in order to claim IPs block=192.168.118.192/26 handle="k8s-pod-network.7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.129 [INFO][4119] ipam.go 1216: Successfully claimed IPs: [192.168.118.195/26] block=192.168.118.192/26 handle="k8s-pod-network.7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.129 [INFO][4119] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.118.195/26] handle="k8s-pod-network.7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.129 [INFO][4119] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:06.174583 env[1468]: 2024-07-02 01:52:06.129 [INFO][4119] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.118.195/26] IPv6=[] ContainerID="7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" HandleID="k8s-pod-network.7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" Workload="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" Jul 2 01:52:06.175228 env[1468]: 2024-07-02 01:52:06.130 [INFO][4096] k8s.go 386: Populated endpoint ContainerID="7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" Namespace="calico-system" Pod="csi-node-driver-x8j4l" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0a1ebfc4-789b-4005-bedf-61c880e9e47c", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"", Pod:"csi-node-driver-x8j4l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.118.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia76ccec04d0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:06.175228 env[1468]: 2024-07-02 01:52:06.130 [INFO][4096] k8s.go 387: Calico CNI using IPs: [192.168.118.195/32] ContainerID="7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" Namespace="calico-system" Pod="csi-node-driver-x8j4l" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" Jul 2 01:52:06.175228 env[1468]: 2024-07-02 01:52:06.130 [INFO][4096] dataplane_linux.go 68: Setting the host side veth name to calia76ccec04d0 ContainerID="7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" Namespace="calico-system" Pod="csi-node-driver-x8j4l" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" Jul 2 01:52:06.175228 env[1468]: 2024-07-02 01:52:06.152 [INFO][4096] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" Namespace="calico-system" Pod="csi-node-driver-x8j4l" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" Jul 2 01:52:06.175228 env[1468]: 2024-07-02 01:52:06.152 [INFO][4096] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" Namespace="calico-system" Pod="csi-node-driver-x8j4l" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0a1ebfc4-789b-4005-bedf-61c880e9e47c", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd", Pod:"csi-node-driver-x8j4l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.118.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia76ccec04d0", MAC:"2e:d5:31:03:5d:13", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:06.175228 env[1468]: 2024-07-02 01:52:06.169 [INFO][4096] k8s.go 500: Wrote updated endpoint to datastore ContainerID="7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd" Namespace="calico-system" Pod="csi-node-driver-x8j4l" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" Jul 2 01:52:06.190000 audit[4142]: NETFILTER_CFG table=filter:110 family=2 entries=38 op=nft_register_chain pid=4142 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:52:06.190000 audit[4142]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19828 a0=3 a1=ffffdd1bac20 a2=0 a3=ffff99c8afa8 items=0 ppid=3608 pid=4142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:06.190000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:06.199508 env[1468]: time="2024-07-02T01:52:06.199057320Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:52:06.199508 env[1468]: time="2024-07-02T01:52:06.199125002Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:52:06.199508 env[1468]: time="2024-07-02T01:52:06.199136362Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:52:06.200349 env[1468]: time="2024-07-02T01:52:06.199873946Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd pid=4156 runtime=io.containerd.runc.v2 Jul 2 01:52:06.221982 systemd[1]: Started cri-containerd-7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd.scope. Jul 2 01:52:06.243554 systemd-networkd[1605]: calic6edf2a5a60: Link UP Jul 2 01:52:06.250888 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic6edf2a5a60: link becomes ready Jul 2 01:52:06.250781 systemd-networkd[1605]: calic6edf2a5a60: Gained carrier Jul 2 01:52:06.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.253000 audit: BPF prog-id=156 op=LOAD Jul 2 01:52:06.254000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.254000 audit[4166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4156 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:06.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764363338653931383533613834646665323934373639336135323434 Jul 2 01:52:06.254000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.254000 audit[4166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4156 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:06.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764363338653931383533613834646665323934373639336135323434 Jul 2 01:52:06.254000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.254000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.254000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.254000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.254000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.254000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.254000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.254000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.254000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.254000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.254000 audit: BPF prog-id=157 op=LOAD Jul 2 01:52:06.254000 audit[4166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4156 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:06.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764363338653931383533613834646665323934373639336135323434 Jul 2 01:52:06.255000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.255000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.255000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.255000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.255000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.255000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.255000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.255000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.255000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.255000 audit: BPF prog-id=158 op=LOAD Jul 2 01:52:06.255000 audit[4166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4156 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:06.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764363338653931383533613834646665323934373639336135323434 Jul 2 01:52:06.256000 audit: BPF prog-id=158 op=UNLOAD Jul 2 01:52:06.256000 audit: BPF prog-id=157 op=UNLOAD Jul 2 01:52:06.256000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.256000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.256000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.256000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.256000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.256000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.256000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.256000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.256000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.256000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.256000 audit: BPF prog-id=159 op=LOAD Jul 2 01:52:06.256000 audit[4166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4156 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:06.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764363338653931383533613834646665323934373639336135323434 Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.107 [INFO][4110] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0 coredns-5dd5756b68- kube-system c04d0a21-b743-4537-bbf9-f6bf77a42e92 739 0 2024-07-02 01:51:30 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.5-a-6c47a6a388 coredns-5dd5756b68-6rqtp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calic6edf2a5a60 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" Namespace="kube-system" Pod="coredns-5dd5756b68-6rqtp" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-" Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.108 [INFO][4110] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" Namespace="kube-system" Pod="coredns-5dd5756b68-6rqtp" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.183 [INFO][4128] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" HandleID="k8s-pod-network.88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.197 [INFO][4128] ipam_plugin.go 264: Auto assigning IP ContainerID="88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" HandleID="k8s-pod-network.88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000310c60), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.5-a-6c47a6a388", "pod":"coredns-5dd5756b68-6rqtp", "timestamp":"2024-07-02 01:52:06.182769801 +0000 UTC"}, Hostname:"ci-3510.3.5-a-6c47a6a388", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.197 [INFO][4128] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.197 [INFO][4128] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.197 [INFO][4128] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-6c47a6a388' Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.200 [INFO][4128] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.204 [INFO][4128] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.207 [INFO][4128] ipam.go 489: Trying affinity for 192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.208 [INFO][4128] ipam.go 155: Attempting to load block cidr=192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.210 [INFO][4128] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.210 [INFO][4128] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.118.192/26 handle="k8s-pod-network.88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.212 [INFO][4128] ipam.go 1685: Creating new handle: k8s-pod-network.88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7 Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.215 [INFO][4128] ipam.go 1203: Writing block in order to claim IPs block=192.168.118.192/26 handle="k8s-pod-network.88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.227 [INFO][4128] ipam.go 1216: Successfully claimed IPs: [192.168.118.196/26] block=192.168.118.192/26 handle="k8s-pod-network.88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.227 [INFO][4128] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.118.196/26] handle="k8s-pod-network.88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.227 [INFO][4128] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:06.266860 env[1468]: 2024-07-02 01:52:06.227 [INFO][4128] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.118.196/26] IPv6=[] ContainerID="88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" HandleID="k8s-pod-network.88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" Jul 2 01:52:06.267762 env[1468]: 2024-07-02 01:52:06.228 [INFO][4110] k8s.go 386: Populated endpoint ContainerID="88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" Namespace="kube-system" Pod="coredns-5dd5756b68-6rqtp" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"c04d0a21-b743-4537-bbf9-f6bf77a42e92", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"", Pod:"coredns-5dd5756b68-6rqtp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.118.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic6edf2a5a60", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:06.267762 env[1468]: 2024-07-02 01:52:06.229 [INFO][4110] k8s.go 387: Calico CNI using IPs: [192.168.118.196/32] ContainerID="88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" Namespace="kube-system" Pod="coredns-5dd5756b68-6rqtp" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" Jul 2 01:52:06.267762 env[1468]: 2024-07-02 01:52:06.229 [INFO][4110] dataplane_linux.go 68: Setting the host side veth name to calic6edf2a5a60 ContainerID="88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" Namespace="kube-system" Pod="coredns-5dd5756b68-6rqtp" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" Jul 2 01:52:06.267762 env[1468]: 2024-07-02 01:52:06.251 [INFO][4110] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" Namespace="kube-system" Pod="coredns-5dd5756b68-6rqtp" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" Jul 2 01:52:06.267762 env[1468]: 2024-07-02 01:52:06.251 [INFO][4110] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" Namespace="kube-system" Pod="coredns-5dd5756b68-6rqtp" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"c04d0a21-b743-4537-bbf9-f6bf77a42e92", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7", Pod:"coredns-5dd5756b68-6rqtp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.118.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic6edf2a5a60", MAC:"02:ba:78:11:5a:7f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:06.267762 env[1468]: 2024-07-02 01:52:06.264 [INFO][4110] k8s.go 500: Wrote updated endpoint to datastore ContainerID="88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7" Namespace="kube-system" Pod="coredns-5dd5756b68-6rqtp" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" Jul 2 01:52:06.283686 env[1468]: time="2024-07-02T01:52:06.283636535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x8j4l,Uid:0a1ebfc4-789b-4005-bedf-61c880e9e47c,Namespace:calico-system,Attempt:1,} returns sandbox id \"7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd\"" Jul 2 01:52:06.291000 audit[4203]: NETFILTER_CFG table=filter:111 family=2 entries=44 op=nft_register_chain pid=4203 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:52:06.291000 audit[4203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22260 a0=3 a1=ffffdbd3d9f0 a2=0 a3=ffff81348fa8 items=0 ppid=3608 pid=4203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:06.291000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:06.304427 env[1468]: time="2024-07-02T01:52:06.304342634Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:52:06.304427 env[1468]: time="2024-07-02T01:52:06.304384316Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:52:06.305410 env[1468]: time="2024-07-02T01:52:06.304394676Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:52:06.305410 env[1468]: time="2024-07-02T01:52:06.304644244Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7 pid=4212 runtime=io.containerd.runc.v2 Jul 2 01:52:06.320128 systemd[1]: Started cri-containerd-88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7.scope. Jul 2 01:52:06.325470 systemd[1]: run-containerd-runc-k8s.io-88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7-runc.pwyxuf.mount: Deactivated successfully. Jul 2 01:52:06.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.338000 audit: BPF prog-id=160 op=LOAD Jul 2 01:52:06.340000 audit[4221]: AVC avc: denied { bpf } for pid=4221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.340000 audit[4221]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4212 pid=4221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:06.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838636466366539663734316566646436313636636264313661613830 Jul 2 01:52:06.340000 audit[4221]: AVC avc: denied { perfmon } for pid=4221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.340000 audit[4221]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4212 pid=4221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:06.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838636466366539663734316566646436313636636264313661613830 Jul 2 01:52:06.340000 audit[4221]: AVC avc: denied { bpf } for pid=4221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.340000 audit[4221]: AVC avc: denied { bpf } for pid=4221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.340000 audit[4221]: AVC avc: denied { bpf } for pid=4221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.340000 audit[4221]: AVC avc: denied { perfmon } for pid=4221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.340000 audit[4221]: AVC avc: denied { perfmon } for pid=4221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.340000 audit[4221]: AVC avc: denied { perfmon } for pid=4221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.340000 audit[4221]: AVC avc: denied { perfmon } for pid=4221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.340000 audit[4221]: AVC avc: denied { perfmon } for pid=4221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.340000 audit[4221]: AVC avc: denied { bpf } for pid=4221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.340000 audit[4221]: AVC avc: denied { bpf } for pid=4221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.340000 audit: BPF prog-id=161 op=LOAD Jul 2 01:52:06.340000 audit[4221]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4212 pid=4221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:06.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838636466366539663734316566646436313636636264313661613830 Jul 2 01:52:06.341000 audit[4221]: AVC avc: denied { bpf } for pid=4221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.341000 audit[4221]: AVC avc: denied { bpf } for pid=4221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.341000 audit[4221]: AVC avc: denied { perfmon } for pid=4221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.341000 audit[4221]: AVC avc: denied { perfmon } for pid=4221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.341000 audit[4221]: AVC avc: denied { perfmon } for pid=4221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.341000 audit[4221]: AVC avc: denied { perfmon } for pid=4221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.341000 audit[4221]: AVC avc: denied { perfmon } for pid=4221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.341000 audit[4221]: AVC avc: denied { bpf } for pid=4221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.341000 audit[4221]: AVC avc: denied { bpf } for pid=4221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.341000 audit: BPF prog-id=162 op=LOAD Jul 2 01:52:06.341000 audit[4221]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4212 pid=4221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:06.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838636466366539663734316566646436313636636264313661613830 Jul 2 01:52:06.341000 audit: BPF prog-id=162 op=UNLOAD Jul 2 01:52:06.341000 audit: BPF prog-id=161 op=UNLOAD Jul 2 01:52:06.342000 audit[4221]: AVC avc: denied { bpf } for pid=4221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.342000 audit[4221]: AVC avc: denied { bpf } for pid=4221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.342000 audit[4221]: AVC avc: denied { bpf } for pid=4221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.342000 audit[4221]: AVC avc: denied { perfmon } for pid=4221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.342000 audit[4221]: AVC avc: denied { perfmon } for pid=4221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.342000 audit[4221]: AVC avc: denied { perfmon } for pid=4221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.342000 audit[4221]: AVC avc: denied { perfmon } for pid=4221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.342000 audit[4221]: AVC avc: denied { perfmon } for pid=4221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.342000 audit[4221]: AVC avc: denied { bpf } for pid=4221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.342000 audit[4221]: AVC avc: denied { bpf } for pid=4221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.342000 audit: BPF prog-id=163 op=LOAD Jul 2 01:52:06.342000 audit[4221]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4212 pid=4221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:06.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838636466366539663734316566646436313636636264313661613830 Jul 2 01:52:06.387890 env[1468]: time="2024-07-02T01:52:06.385457818Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-6rqtp,Uid:c04d0a21-b743-4537-bbf9-f6bf77a42e92,Namespace:kube-system,Attempt:1,} returns sandbox id \"88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7\"" Jul 2 01:52:06.429063 env[1468]: time="2024-07-02T01:52:06.429000806Z" level=info msg="CreateContainer within sandbox \"88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 01:52:06.516501 env[1468]: time="2024-07-02T01:52:06.516440311Z" level=info msg="CreateContainer within sandbox \"88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"1c142de7ac4bc0a19aafbb814ced2795674830b45bf2114b06bc4fc9723bb9ea\"" Jul 2 01:52:06.520002 env[1468]: time="2024-07-02T01:52:06.517620309Z" level=info msg="StartContainer for \"1c142de7ac4bc0a19aafbb814ced2795674830b45bf2114b06bc4fc9723bb9ea\"" Jul 2 01:52:06.535211 systemd[1]: Started cri-containerd-1c142de7ac4bc0a19aafbb814ced2795674830b45bf2114b06bc4fc9723bb9ea.scope. Jul 2 01:52:06.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.553000 audit: BPF prog-id=164 op=LOAD Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4212 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:06.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163313432646537616334626330613139616166626238313463656432 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4212 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:06.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163313432646537616334626330613139616166626238313463656432 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit: BPF prog-id=165 op=LOAD Jul 2 01:52:06.554000 audit[4255]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4212 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:06.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163313432646537616334626330613139616166626238313463656432 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit: BPF prog-id=166 op=LOAD Jul 2 01:52:06.554000 audit[4255]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4212 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:06.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163313432646537616334626330613139616166626238313463656432 Jul 2 01:52:06.554000 audit: BPF prog-id=166 op=UNLOAD Jul 2 01:52:06.554000 audit: BPF prog-id=165 op=UNLOAD Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:06.554000 audit: BPF prog-id=167 op=LOAD Jul 2 01:52:06.554000 audit[4255]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4212 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:06.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163313432646537616334626330613139616166626238313463656432 Jul 2 01:52:06.575754 env[1468]: time="2024-07-02T01:52:06.575660518Z" level=info msg="StartContainer for \"1c142de7ac4bc0a19aafbb814ced2795674830b45bf2114b06bc4fc9723bb9ea\" returns successfully" Jul 2 01:52:07.030829 kubelet[2577]: I0702 01:52:07.030505 2577 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-6rqtp" podStartSLOduration=37.030446796 podCreationTimestamp="2024-07-02 01:51:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 01:52:07.030115026 +0000 UTC m=+51.285770589" watchObservedRunningTime="2024-07-02 01:52:07.030446796 +0000 UTC m=+51.286102359" Jul 2 01:52:07.052000 audit[4289]: NETFILTER_CFG table=filter:112 family=2 entries=8 op=nft_register_rule pid=4289 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:07.052000 audit[4289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd749d910 a2=0 a3=1 items=0 ppid=2755 pid=4289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:07.052000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:07.059000 audit[4289]: NETFILTER_CFG table=nat:113 family=2 entries=44 op=nft_register_rule pid=4289 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:07.059000 audit[4289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffd749d910 a2=0 a3=1 items=0 ppid=2755 pid=4289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:07.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:07.082000 audit[4291]: NETFILTER_CFG table=filter:114 family=2 entries=8 op=nft_register_rule pid=4291 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:07.082000 audit[4291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe0df77e0 a2=0 a3=1 items=0 ppid=2755 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:07.082000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:07.089000 audit[4291]: NETFILTER_CFG table=nat:115 family=2 entries=56 op=nft_register_chain pid=4291 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:07.089000 audit[4291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffe0df77e0 a2=0 a3=1 items=0 ppid=2755 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:07.089000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:07.133553 systemd-networkd[1605]: calicf6ca055468: Gained IPv6LL Jul 2 01:52:07.241078 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount868956632.mount: Deactivated successfully. Jul 2 01:52:07.557375 env[1468]: time="2024-07-02T01:52:07.557319427Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:07.564480 env[1468]: time="2024-07-02T01:52:07.564436771Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:89df47edb6965978d3683de1cac38ee5b47d7054332bbea7cc0ef3b3c17da2e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:07.569908 env[1468]: time="2024-07-02T01:52:07.569869502Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:07.575138 env[1468]: time="2024-07-02T01:52:07.575100307Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c35e88abef622483409fff52313bf764a75095197be4c5a7c7830da342654de1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:07.575939 env[1468]: time="2024-07-02T01:52:07.575912412Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\" returns image reference \"sha256:89df47edb6965978d3683de1cac38ee5b47d7054332bbea7cc0ef3b3c17da2e1\"" Jul 2 01:52:07.579031 env[1468]: time="2024-07-02T01:52:07.578939028Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 01:52:07.587339 systemd-networkd[1605]: calia76ccec04d0: Gained IPv6LL Jul 2 01:52:07.593538 env[1468]: time="2024-07-02T01:52:07.593500086Z" level=info msg="CreateContainer within sandbox \"46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 2 01:52:07.625598 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2802745666.mount: Deactivated successfully. Jul 2 01:52:07.643229 env[1468]: time="2024-07-02T01:52:07.643185331Z" level=info msg="CreateContainer within sandbox \"46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"2138fa7b34eebd4db73c5c430ba820a5f7f8139a4148f9f556cb4829b12aa281\"" Jul 2 01:52:07.645166 env[1468]: time="2024-07-02T01:52:07.643845991Z" level=info msg="StartContainer for \"2138fa7b34eebd4db73c5c430ba820a5f7f8139a4148f9f556cb4829b12aa281\"" Jul 2 01:52:07.661965 systemd[1]: Started cri-containerd-2138fa7b34eebd4db73c5c430ba820a5f7f8139a4148f9f556cb4829b12aa281.scope. Jul 2 01:52:07.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.682000 audit: BPF prog-id=168 op=LOAD Jul 2 01:52:07.682000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.682000 audit[4303]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4010 pid=4303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:07.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231333866613762333465656264346462373363356334333062613832 Jul 2 01:52:07.682000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.682000 audit[4303]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4010 pid=4303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:07.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231333866613762333465656264346462373363356334333062613832 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit: BPF prog-id=169 op=LOAD Jul 2 01:52:07.683000 audit[4303]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4010 pid=4303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:07.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231333866613762333465656264346462373363356334333062613832 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.683000 audit: BPF prog-id=170 op=LOAD Jul 2 01:52:07.683000 audit[4303]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4010 pid=4303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:07.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231333866613762333465656264346462373363356334333062613832 Jul 2 01:52:07.684000 audit: BPF prog-id=170 op=UNLOAD Jul 2 01:52:07.684000 audit: BPF prog-id=169 op=UNLOAD Jul 2 01:52:07.684000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.684000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.684000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.684000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.684000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.684000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.684000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.684000 audit[4303]: AVC avc: denied { perfmon } for pid=4303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.684000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.684000 audit[4303]: AVC avc: denied { bpf } for pid=4303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:07.684000 audit: BPF prog-id=171 op=LOAD Jul 2 01:52:07.684000 audit[4303]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4010 pid=4303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:07.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231333866613762333465656264346462373363356334333062613832 Jul 2 01:52:07.710998 env[1468]: time="2024-07-02T01:52:07.710931904Z" level=info msg="StartContainer for \"2138fa7b34eebd4db73c5c430ba820a5f7f8139a4148f9f556cb4829b12aa281\" returns successfully" Jul 2 01:52:07.772948 systemd-networkd[1605]: calic6edf2a5a60: Gained IPv6LL Jul 2 01:52:08.084543 kubelet[2577]: I0702 01:52:08.084499 2577 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6456d768b7-p5gwp" podStartSLOduration=28.659780476999998 podCreationTimestamp="2024-07-02 01:51:37 +0000 UTC" firstStartedPulling="2024-07-02 01:52:05.15208428 +0000 UTC m=+49.407739843" lastFinishedPulling="2024-07-02 01:52:07.576762439 +0000 UTC m=+51.832418002" observedRunningTime="2024-07-02 01:52:08.03961128 +0000 UTC m=+52.295266843" watchObservedRunningTime="2024-07-02 01:52:08.084458636 +0000 UTC m=+52.340114199" Jul 2 01:52:08.890372 env[1468]: time="2024-07-02T01:52:08.890320482Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:08.909000 env[1468]: time="2024-07-02T01:52:08.908937102Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:94ad0dc71bacd91f470c20e61073c2dc00648fd583c0fb95657dee38af05e5ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:08.971733 env[1468]: time="2024-07-02T01:52:08.971685375Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:09.029009 systemd[1]: run-containerd-runc-k8s.io-51d203fa79ffe8596bb00cd8d734cbc4660338a3fd4989abcc4ab06e94ac0bcd-runc.FiZcNT.mount: Deactivated successfully. Jul 2 01:52:09.112827 env[1468]: time="2024-07-02T01:52:09.112765008Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:09.113497 env[1468]: time="2024-07-02T01:52:09.113461590Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:94ad0dc71bacd91f470c20e61073c2dc00648fd583c0fb95657dee38af05e5ed\"" Jul 2 01:52:09.115941 env[1468]: time="2024-07-02T01:52:09.115883984Z" level=info msg="CreateContainer within sandbox \"7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 01:52:09.497192 env[1468]: time="2024-07-02T01:52:09.497131000Z" level=info msg="CreateContainer within sandbox \"7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3b770c9db56e1adeb8ae5cb3fd8b8fd509ac6f3b75181d62a3ce053280d169ff\"" Jul 2 01:52:09.497934 env[1468]: time="2024-07-02T01:52:09.497878423Z" level=info msg="StartContainer for \"3b770c9db56e1adeb8ae5cb3fd8b8fd509ac6f3b75181d62a3ce053280d169ff\"" Jul 2 01:52:09.522144 systemd[1]: run-containerd-runc-k8s.io-3b770c9db56e1adeb8ae5cb3fd8b8fd509ac6f3b75181d62a3ce053280d169ff-runc.D32w9T.mount: Deactivated successfully. Jul 2 01:52:09.527623 systemd[1]: Started cri-containerd-3b770c9db56e1adeb8ae5cb3fd8b8fd509ac6f3b75181d62a3ce053280d169ff.scope. Jul 2 01:52:09.580726 kernel: kauditd_printk_skb: 425 callbacks suppressed Jul 2 01:52:09.580896 kernel: audit: type=1400 audit(1719885129.558:1172): avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.558000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.558000 audit[4378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4156 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:09.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362373730633964623536653161646562386165356362336664386238 Jul 2 01:52:09.608832 kernel: audit: type=1300 audit(1719885129.558:1172): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4156 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:09.558000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.648653 kernel: audit: type=1327 audit(1719885129.558:1172): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362373730633964623536653161646562386165356362336664386238 Jul 2 01:52:09.648751 kernel: audit: type=1400 audit(1719885129.558:1173): avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.558000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.665464 kernel: audit: type=1400 audit(1719885129.558:1173): avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.558000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.683535 kernel: audit: type=1400 audit(1719885129.558:1173): avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.558000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.700644 kernel: audit: type=1400 audit(1719885129.558:1173): avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.700757 env[1468]: time="2024-07-02T01:52:09.689815971Z" level=info msg="StartContainer for \"3b770c9db56e1adeb8ae5cb3fd8b8fd509ac6f3b75181d62a3ce053280d169ff\" returns successfully" Jul 2 01:52:09.702960 env[1468]: time="2024-07-02T01:52:09.702702848Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 01:52:09.558000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.719871 kernel: audit: type=1400 audit(1719885129.558:1173): avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.558000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.737085 kernel: audit: type=1400 audit(1719885129.558:1173): avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.558000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.558000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.558000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.558000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.558000 audit: BPF prog-id=172 op=LOAD Jul 2 01:52:09.558000 audit[4378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4156 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:09.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362373730633964623536653161646562386165356362336664386238 Jul 2 01:52:09.563000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.755823 kernel: audit: type=1400 audit(1719885129.558:1173): avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.563000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.563000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.563000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.563000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.563000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.563000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.563000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.563000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.563000 audit: BPF prog-id=173 op=LOAD Jul 2 01:52:09.563000 audit[4378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4156 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:09.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362373730633964623536653161646562386165356362336664386238 Jul 2 01:52:09.581000 audit: BPF prog-id=173 op=UNLOAD Jul 2 01:52:09.581000 audit: BPF prog-id=172 op=UNLOAD Jul 2 01:52:09.581000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.581000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.581000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.581000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.581000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.581000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.581000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.581000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.581000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.581000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.581000 audit: BPF prog-id=174 op=LOAD Jul 2 01:52:09.581000 audit[4378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4156 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:09.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362373730633964623536653161646562386165356362336664386238 Jul 2 01:52:10.954927 env[1468]: time="2024-07-02T01:52:10.954885992Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:10.961835 env[1468]: time="2024-07-02T01:52:10.961783202Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f708eddd5878891da5bc6148fc8bb3f7277210481a15957910fe5fb551a5ed28,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:10.968386 env[1468]: time="2024-07-02T01:52:10.968330161Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:10.973272 env[1468]: time="2024-07-02T01:52:10.973226190Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:10.973692 env[1468]: time="2024-07-02T01:52:10.973654444Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:f708eddd5878891da5bc6148fc8bb3f7277210481a15957910fe5fb551a5ed28\"" Jul 2 01:52:10.976788 env[1468]: time="2024-07-02T01:52:10.976747858Z" level=info msg="CreateContainer within sandbox \"7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 01:52:11.020947 env[1468]: time="2024-07-02T01:52:11.020893275Z" level=info msg="CreateContainer within sandbox \"7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"931098d60c90f101db6456bb0c30d73febd35cfb6d27256f0d08af124a8e285a\"" Jul 2 01:52:11.021796 env[1468]: time="2024-07-02T01:52:11.021758741Z" level=info msg="StartContainer for \"931098d60c90f101db6456bb0c30d73febd35cfb6d27256f0d08af124a8e285a\"" Jul 2 01:52:11.064682 systemd[1]: Started cri-containerd-931098d60c90f101db6456bb0c30d73febd35cfb6d27256f0d08af124a8e285a.scope. Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4156 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:11.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313039386436306339306631303164623634353662623063333064 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit: BPF prog-id=175 op=LOAD Jul 2 01:52:11.078000 audit[4422]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4156 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:11.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313039386436306339306631303164623634353662623063333064 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit: BPF prog-id=176 op=LOAD Jul 2 01:52:11.078000 audit[4422]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4156 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:11.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313039386436306339306631303164623634353662623063333064 Jul 2 01:52:11.078000 audit: BPF prog-id=176 op=UNLOAD Jul 2 01:52:11.078000 audit: BPF prog-id=175 op=UNLOAD Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:11.078000 audit: BPF prog-id=177 op=LOAD Jul 2 01:52:11.078000 audit[4422]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4156 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:11.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313039386436306339306631303164623634353662623063333064 Jul 2 01:52:11.115003 env[1468]: time="2024-07-02T01:52:11.114946908Z" level=info msg="StartContainer for \"931098d60c90f101db6456bb0c30d73febd35cfb6d27256f0d08af124a8e285a\" returns successfully" Jul 2 01:52:11.211409 kubelet[2577]: I0702 01:52:11.211251 2577 topology_manager.go:215] "Topology Admit Handler" podUID="b2eb01c8-3e78-461a-b6b4-1b8db8766eb4" podNamespace="calico-apiserver" podName="calico-apiserver-75bdf5bdf7-psmch" Jul 2 01:52:11.218839 systemd[1]: Created slice kubepods-besteffort-podb2eb01c8_3e78_461a_b6b4_1b8db8766eb4.slice. Jul 2 01:52:11.241249 kubelet[2577]: I0702 01:52:11.241214 2577 topology_manager.go:215] "Topology Admit Handler" podUID="d2a3e0c3-dfe1-499a-a408-b6d93c00724a" podNamespace="calico-apiserver" podName="calico-apiserver-75bdf5bdf7-hc2tv" Jul 2 01:52:11.246246 systemd[1]: Created slice kubepods-besteffort-podd2a3e0c3_dfe1_499a_a408_b6d93c00724a.slice. Jul 2 01:52:11.269000 audit[4454]: NETFILTER_CFG table=filter:116 family=2 entries=9 op=nft_register_rule pid=4454 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:11.269000 audit[4454]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffccc8f70 a2=0 a3=1 items=0 ppid=2755 pid=4454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:11.269000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:11.284000 audit[4454]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=4454 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:11.284000 audit[4454]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffccc8f70 a2=0 a3=1 items=0 ppid=2755 pid=4454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:11.284000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:11.289035 kubelet[2577]: I0702 01:52:11.289009 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-77rzw\" (UniqueName: \"kubernetes.io/projected/b2eb01c8-3e78-461a-b6b4-1b8db8766eb4-kube-api-access-77rzw\") pod \"calico-apiserver-75bdf5bdf7-psmch\" (UID: \"b2eb01c8-3e78-461a-b6b4-1b8db8766eb4\") " pod="calico-apiserver/calico-apiserver-75bdf5bdf7-psmch" Jul 2 01:52:11.289281 kubelet[2577]: I0702 01:52:11.289251 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pwcdt\" (UniqueName: \"kubernetes.io/projected/d2a3e0c3-dfe1-499a-a408-b6d93c00724a-kube-api-access-pwcdt\") pod \"calico-apiserver-75bdf5bdf7-hc2tv\" (UID: \"d2a3e0c3-dfe1-499a-a408-b6d93c00724a\") " pod="calico-apiserver/calico-apiserver-75bdf5bdf7-hc2tv" Jul 2 01:52:11.289374 kubelet[2577]: I0702 01:52:11.289304 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b2eb01c8-3e78-461a-b6b4-1b8db8766eb4-calico-apiserver-certs\") pod \"calico-apiserver-75bdf5bdf7-psmch\" (UID: \"b2eb01c8-3e78-461a-b6b4-1b8db8766eb4\") " pod="calico-apiserver/calico-apiserver-75bdf5bdf7-psmch" Jul 2 01:52:11.289374 kubelet[2577]: I0702 01:52:11.289329 2577 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d2a3e0c3-dfe1-499a-a408-b6d93c00724a-calico-apiserver-certs\") pod \"calico-apiserver-75bdf5bdf7-hc2tv\" (UID: \"d2a3e0c3-dfe1-499a-a408-b6d93c00724a\") " pod="calico-apiserver/calico-apiserver-75bdf5bdf7-hc2tv" Jul 2 01:52:11.303000 audit[4458]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4458 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:11.303000 audit[4458]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff46e64d0 a2=0 a3=1 items=0 ppid=2755 pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:11.303000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:11.306000 audit[4458]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4458 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:11.306000 audit[4458]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff46e64d0 a2=0 a3=1 items=0 ppid=2755 pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:11.306000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:11.392414 kubelet[2577]: E0702 01:52:11.392376 2577 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 01:52:11.392939 kubelet[2577]: E0702 01:52:11.392419 2577 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 01:52:11.393002 kubelet[2577]: E0702 01:52:11.392924 2577 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/d2a3e0c3-dfe1-499a-a408-b6d93c00724a-calico-apiserver-certs podName:d2a3e0c3-dfe1-499a-a408-b6d93c00724a nodeName:}" failed. No retries permitted until 2024-07-02 01:52:11.89289592 +0000 UTC m=+56.148551483 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/d2a3e0c3-dfe1-499a-a408-b6d93c00724a-calico-apiserver-certs") pod "calico-apiserver-75bdf5bdf7-hc2tv" (UID: "d2a3e0c3-dfe1-499a-a408-b6d93c00724a") : secret "calico-apiserver-certs" not found Jul 2 01:52:11.393002 kubelet[2577]: E0702 01:52:11.392979 2577 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/b2eb01c8-3e78-461a-b6b4-1b8db8766eb4-calico-apiserver-certs podName:b2eb01c8-3e78-461a-b6b4-1b8db8766eb4 nodeName:}" failed. No retries permitted until 2024-07-02 01:52:11.892962802 +0000 UTC m=+56.148618365 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/b2eb01c8-3e78-461a-b6b4-1b8db8766eb4-calico-apiserver-certs") pod "calico-apiserver-75bdf5bdf7-psmch" (UID: "b2eb01c8-3e78-461a-b6b4-1b8db8766eb4") : secret "calico-apiserver-certs" not found Jul 2 01:52:11.893236 kubelet[2577]: E0702 01:52:11.893189 2577 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 01:52:11.893415 kubelet[2577]: E0702 01:52:11.893267 2577 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/b2eb01c8-3e78-461a-b6b4-1b8db8766eb4-calico-apiserver-certs podName:b2eb01c8-3e78-461a-b6b4-1b8db8766eb4 nodeName:}" failed. No retries permitted until 2024-07-02 01:52:12.89324951 +0000 UTC m=+57.148905033 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/b2eb01c8-3e78-461a-b6b4-1b8db8766eb4-calico-apiserver-certs") pod "calico-apiserver-75bdf5bdf7-psmch" (UID: "b2eb01c8-3e78-461a-b6b4-1b8db8766eb4") : secret "calico-apiserver-certs" not found Jul 2 01:52:11.893690 kubelet[2577]: E0702 01:52:11.893666 2577 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 01:52:11.893747 kubelet[2577]: E0702 01:52:11.893718 2577 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/d2a3e0c3-dfe1-499a-a408-b6d93c00724a-calico-apiserver-certs podName:d2a3e0c3-dfe1-499a-a408-b6d93c00724a nodeName:}" failed. No retries permitted until 2024-07-02 01:52:12.893707004 +0000 UTC m=+57.149362567 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/d2a3e0c3-dfe1-499a-a408-b6d93c00724a-calico-apiserver-certs") pod "calico-apiserver-75bdf5bdf7-hc2tv" (UID: "d2a3e0c3-dfe1-499a-a408-b6d93c00724a") : secret "calico-apiserver-certs" not found Jul 2 01:52:11.959599 kubelet[2577]: I0702 01:52:11.959563 2577 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 01:52:11.959599 kubelet[2577]: I0702 01:52:11.959598 2577 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 01:52:12.054945 kubelet[2577]: I0702 01:52:12.054911 2577 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-x8j4l" podStartSLOduration=30.366114453 podCreationTimestamp="2024-07-02 01:51:37 +0000 UTC" firstStartedPulling="2024-07-02 01:52:06.285189464 +0000 UTC m=+50.540845027" lastFinishedPulling="2024-07-02 01:52:10.973947532 +0000 UTC m=+55.229603095" observedRunningTime="2024-07-02 01:52:12.054274744 +0000 UTC m=+56.309930307" watchObservedRunningTime="2024-07-02 01:52:12.054872521 +0000 UTC m=+56.310528084" Jul 2 01:52:12.178000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:12.178000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:12.178000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40026988d0 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:52:12.178000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:52:12.178000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002ae6be0 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:52:12.178000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:52:12.285000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:12.285000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4004a47b60 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:52:12.285000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:52:12.286000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:12.286000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4004a47d10 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:52:12.286000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:52:12.286000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:12.286000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400848f180 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:52:12.286000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:52:12.296000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:12.296000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4004694ea0 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:52:12.296000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:52:12.297000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:12.297000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=40065084b0 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:52:12.297000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:52:12.297000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:12.297000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4007b00d60 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:52:12.297000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:52:13.024138 env[1468]: time="2024-07-02T01:52:13.023712350Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75bdf5bdf7-psmch,Uid:b2eb01c8-3e78-461a-b6b4-1b8db8766eb4,Namespace:calico-apiserver,Attempt:0,}" Jul 2 01:52:13.049499 env[1468]: time="2024-07-02T01:52:13.049457789Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75bdf5bdf7-hc2tv,Uid:d2a3e0c3-dfe1-499a-a408-b6d93c00724a,Namespace:calico-apiserver,Attempt:0,}" Jul 2 01:52:13.279828 systemd-networkd[1605]: calic5bfeb9a120: Link UP Jul 2 01:52:13.292815 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:52:13.292955 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic5bfeb9a120: link becomes ready Jul 2 01:52:13.296233 systemd-networkd[1605]: calic5bfeb9a120: Gained carrier Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.158 [INFO][4464] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--psmch-eth0 calico-apiserver-75bdf5bdf7- calico-apiserver b2eb01c8-3e78-461a-b6b4-1b8db8766eb4 831 0 2024-07-02 01:52:11 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75bdf5bdf7 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.5-a-6c47a6a388 calico-apiserver-75bdf5bdf7-psmch eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic5bfeb9a120 [] []}} ContainerID="464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" Namespace="calico-apiserver" Pod="calico-apiserver-75bdf5bdf7-psmch" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--psmch-" Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.158 [INFO][4464] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" Namespace="calico-apiserver" Pod="calico-apiserver-75bdf5bdf7-psmch" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--psmch-eth0" Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.228 [INFO][4486] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" HandleID="k8s-pod-network.464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--psmch-eth0" Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.241 [INFO][4486] ipam_plugin.go 264: Auto assigning IP ContainerID="464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" HandleID="k8s-pod-network.464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--psmch-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000115e60), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.5-a-6c47a6a388", "pod":"calico-apiserver-75bdf5bdf7-psmch", "timestamp":"2024-07-02 01:52:13.228960644 +0000 UTC"}, Hostname:"ci-3510.3.5-a-6c47a6a388", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.241 [INFO][4486] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.241 [INFO][4486] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.241 [INFO][4486] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-6c47a6a388' Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.243 [INFO][4486] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.246 [INFO][4486] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.253 [INFO][4486] ipam.go 489: Trying affinity for 192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.255 [INFO][4486] ipam.go 155: Attempting to load block cidr=192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.257 [INFO][4486] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.257 [INFO][4486] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.118.192/26 handle="k8s-pod-network.464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.259 [INFO][4486] ipam.go 1685: Creating new handle: k8s-pod-network.464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013 Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.265 [INFO][4486] ipam.go 1203: Writing block in order to claim IPs block=192.168.118.192/26 handle="k8s-pod-network.464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.272 [INFO][4486] ipam.go 1216: Successfully claimed IPs: [192.168.118.197/26] block=192.168.118.192/26 handle="k8s-pod-network.464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.272 [INFO][4486] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.118.197/26] handle="k8s-pod-network.464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.273 [INFO][4486] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:13.317578 env[1468]: 2024-07-02 01:52:13.273 [INFO][4486] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.118.197/26] IPv6=[] ContainerID="464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" HandleID="k8s-pod-network.464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--psmch-eth0" Jul 2 01:52:13.318274 env[1468]: 2024-07-02 01:52:13.276 [INFO][4464] k8s.go 386: Populated endpoint ContainerID="464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" Namespace="calico-apiserver" Pod="calico-apiserver-75bdf5bdf7-psmch" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--psmch-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--psmch-eth0", GenerateName:"calico-apiserver-75bdf5bdf7-", Namespace:"calico-apiserver", SelfLink:"", UID:"b2eb01c8-3e78-461a-b6b4-1b8db8766eb4", ResourceVersion:"831", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 52, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75bdf5bdf7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"", Pod:"calico-apiserver-75bdf5bdf7-psmch", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.118.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic5bfeb9a120", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:13.318274 env[1468]: 2024-07-02 01:52:13.276 [INFO][4464] k8s.go 387: Calico CNI using IPs: [192.168.118.197/32] ContainerID="464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" Namespace="calico-apiserver" Pod="calico-apiserver-75bdf5bdf7-psmch" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--psmch-eth0" Jul 2 01:52:13.318274 env[1468]: 2024-07-02 01:52:13.276 [INFO][4464] dataplane_linux.go 68: Setting the host side veth name to calic5bfeb9a120 ContainerID="464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" Namespace="calico-apiserver" Pod="calico-apiserver-75bdf5bdf7-psmch" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--psmch-eth0" Jul 2 01:52:13.318274 env[1468]: 2024-07-02 01:52:13.296 [INFO][4464] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" Namespace="calico-apiserver" Pod="calico-apiserver-75bdf5bdf7-psmch" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--psmch-eth0" Jul 2 01:52:13.318274 env[1468]: 2024-07-02 01:52:13.297 [INFO][4464] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" Namespace="calico-apiserver" Pod="calico-apiserver-75bdf5bdf7-psmch" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--psmch-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--psmch-eth0", GenerateName:"calico-apiserver-75bdf5bdf7-", Namespace:"calico-apiserver", SelfLink:"", UID:"b2eb01c8-3e78-461a-b6b4-1b8db8766eb4", ResourceVersion:"831", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 52, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75bdf5bdf7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013", Pod:"calico-apiserver-75bdf5bdf7-psmch", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.118.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic5bfeb9a120", MAC:"76:18:9a:5d:3c:d9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:13.318274 env[1468]: 2024-07-02 01:52:13.316 [INFO][4464] k8s.go 500: Wrote updated endpoint to datastore ContainerID="464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013" Namespace="calico-apiserver" Pod="calico-apiserver-75bdf5bdf7-psmch" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--psmch-eth0" Jul 2 01:52:13.339853 env[1468]: time="2024-07-02T01:52:13.336960910Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:52:13.339853 env[1468]: time="2024-07-02T01:52:13.336996151Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:52:13.339853 env[1468]: time="2024-07-02T01:52:13.337006751Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:52:13.339853 env[1468]: time="2024-07-02T01:52:13.337130555Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013 pid=4520 runtime=io.containerd.runc.v2 Jul 2 01:52:13.374292 systemd[1]: Started cri-containerd-464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013.scope. Jul 2 01:52:13.388916 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali28540de81d5: link becomes ready Jul 2 01:52:13.393000 systemd-networkd[1605]: cali28540de81d5: Link UP Jul 2 01:52:13.395241 systemd-networkd[1605]: cali28540de81d5: Gained carrier Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.198 [INFO][4474] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--hc2tv-eth0 calico-apiserver-75bdf5bdf7- calico-apiserver d2a3e0c3-dfe1-499a-a408-b6d93c00724a 834 0 2024-07-02 01:52:11 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75bdf5bdf7 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.5-a-6c47a6a388 calico-apiserver-75bdf5bdf7-hc2tv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali28540de81d5 [] []}} ContainerID="e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" Namespace="calico-apiserver" Pod="calico-apiserver-75bdf5bdf7-hc2tv" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--hc2tv-" Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.198 [INFO][4474] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" Namespace="calico-apiserver" Pod="calico-apiserver-75bdf5bdf7-hc2tv" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--hc2tv-eth0" Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.266 [INFO][4492] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" HandleID="k8s-pod-network.e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--hc2tv-eth0" Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.308 [INFO][4492] ipam_plugin.go 264: Auto assigning IP ContainerID="e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" HandleID="k8s-pod-network.e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--hc2tv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000318090), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.5-a-6c47a6a388", "pod":"calico-apiserver-75bdf5bdf7-hc2tv", "timestamp":"2024-07-02 01:52:13.266514312 +0000 UTC"}, Hostname:"ci-3510.3.5-a-6c47a6a388", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.308 [INFO][4492] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.308 [INFO][4492] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.308 [INFO][4492] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-6c47a6a388' Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.312 [INFO][4492] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.322 [INFO][4492] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.330 [INFO][4492] ipam.go 489: Trying affinity for 192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.339 [INFO][4492] ipam.go 155: Attempting to load block cidr=192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.342 [INFO][4492] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.118.192/26 host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.342 [INFO][4492] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.118.192/26 handle="k8s-pod-network.e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.349 [INFO][4492] ipam.go 1685: Creating new handle: k8s-pod-network.e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89 Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.357 [INFO][4492] ipam.go 1203: Writing block in order to claim IPs block=192.168.118.192/26 handle="k8s-pod-network.e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.363 [INFO][4492] ipam.go 1216: Successfully claimed IPs: [192.168.118.198/26] block=192.168.118.192/26 handle="k8s-pod-network.e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.363 [INFO][4492] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.118.198/26] handle="k8s-pod-network.e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" host="ci-3510.3.5-a-6c47a6a388" Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.363 [INFO][4492] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:13.407034 env[1468]: 2024-07-02 01:52:13.363 [INFO][4492] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.118.198/26] IPv6=[] ContainerID="e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" HandleID="k8s-pod-network.e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--hc2tv-eth0" Jul 2 01:52:13.407654 env[1468]: 2024-07-02 01:52:13.365 [INFO][4474] k8s.go 386: Populated endpoint ContainerID="e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" Namespace="calico-apiserver" Pod="calico-apiserver-75bdf5bdf7-hc2tv" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--hc2tv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--hc2tv-eth0", GenerateName:"calico-apiserver-75bdf5bdf7-", Namespace:"calico-apiserver", SelfLink:"", UID:"d2a3e0c3-dfe1-499a-a408-b6d93c00724a", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 52, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75bdf5bdf7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"", Pod:"calico-apiserver-75bdf5bdf7-hc2tv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.118.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali28540de81d5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:13.407654 env[1468]: 2024-07-02 01:52:13.365 [INFO][4474] k8s.go 387: Calico CNI using IPs: [192.168.118.198/32] ContainerID="e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" Namespace="calico-apiserver" Pod="calico-apiserver-75bdf5bdf7-hc2tv" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--hc2tv-eth0" Jul 2 01:52:13.407654 env[1468]: 2024-07-02 01:52:13.365 [INFO][4474] dataplane_linux.go 68: Setting the host side veth name to cali28540de81d5 ContainerID="e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" Namespace="calico-apiserver" Pod="calico-apiserver-75bdf5bdf7-hc2tv" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--hc2tv-eth0" Jul 2 01:52:13.407654 env[1468]: 2024-07-02 01:52:13.390 [INFO][4474] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" Namespace="calico-apiserver" Pod="calico-apiserver-75bdf5bdf7-hc2tv" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--hc2tv-eth0" Jul 2 01:52:13.407654 env[1468]: 2024-07-02 01:52:13.396 [INFO][4474] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" Namespace="calico-apiserver" Pod="calico-apiserver-75bdf5bdf7-hc2tv" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--hc2tv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--hc2tv-eth0", GenerateName:"calico-apiserver-75bdf5bdf7-", Namespace:"calico-apiserver", SelfLink:"", UID:"d2a3e0c3-dfe1-499a-a408-b6d93c00724a", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 52, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75bdf5bdf7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89", Pod:"calico-apiserver-75bdf5bdf7-hc2tv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.118.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali28540de81d5", MAC:"b6:75:f4:16:d7:ee", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:13.407654 env[1468]: 2024-07-02 01:52:13.405 [INFO][4474] k8s.go 500: Wrote updated endpoint to datastore ContainerID="e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89" Namespace="calico-apiserver" Pod="calico-apiserver-75bdf5bdf7-hc2tv" WorkloadEndpoint="ci--3510.3.5--a--6c47a6a388-k8s-calico--apiserver--75bdf5bdf7--hc2tv-eth0" Jul 2 01:52:13.410000 audit[4544]: NETFILTER_CFG table=filter:120 family=2 entries=47 op=nft_register_chain pid=4544 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:52:13.410000 audit[4544]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25108 a0=3 a1=ffffc7296d80 a2=0 a3=ffffad507fa8 items=0 ppid=3608 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:13.410000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:13.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.419000 audit: BPF prog-id=178 op=LOAD Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4520 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:13.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436346233393666336465373730636430303839663863306266353965 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4520 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:13.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436346233393666336465373730636430303839663863306266353965 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit: BPF prog-id=179 op=LOAD Jul 2 01:52:13.420000 audit[4529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4520 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:13.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436346233393666336465373730636430303839663863306266353965 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit: BPF prog-id=180 op=LOAD Jul 2 01:52:13.420000 audit[4529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4520 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:13.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436346233393666336465373730636430303839663863306266353965 Jul 2 01:52:13.420000 audit: BPF prog-id=180 op=UNLOAD Jul 2 01:52:13.420000 audit: BPF prog-id=179 op=UNLOAD Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.420000 audit: BPF prog-id=181 op=LOAD Jul 2 01:52:13.420000 audit[4529]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4520 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:13.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436346233393666336465373730636430303839663863306266353965 Jul 2 01:52:13.431565 env[1468]: time="2024-07-02T01:52:13.431492098Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:52:13.431565 env[1468]: time="2024-07-02T01:52:13.431531979Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:52:13.431784 env[1468]: time="2024-07-02T01:52:13.431542620Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:52:13.432099 env[1468]: time="2024-07-02T01:52:13.432043354Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89 pid=4565 runtime=io.containerd.runc.v2 Jul 2 01:52:13.456897 systemd[1]: Started cri-containerd-e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89.scope. Jul 2 01:52:13.469973 env[1468]: time="2024-07-02T01:52:13.469926992Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75bdf5bdf7-psmch,Uid:b2eb01c8-3e78-461a-b6b4-1b8db8766eb4,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013\"" Jul 2 01:52:13.474793 env[1468]: time="2024-07-02T01:52:13.474754534Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 01:52:13.477000 audit[4593]: NETFILTER_CFG table=filter:121 family=2 entries=47 op=nft_register_chain pid=4593 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:52:13.477000 audit[4593]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24760 a0=3 a1=ffffc4e9b940 a2=0 a3=ffff8d682fa8 items=0 ppid=3608 pid=4593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:13.477000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.495000 audit: BPF prog-id=182 op=LOAD Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4565 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:13.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535626336333165613530643463663662616331316561353335623730 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4565 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:13.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535626336333165613530643463663662616331316561353335623730 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit: BPF prog-id=183 op=LOAD Jul 2 01:52:13.496000 audit[4574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4565 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:13.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535626336333165613530643463663662616331316561353335623730 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit: BPF prog-id=184 op=LOAD Jul 2 01:52:13.496000 audit[4574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4565 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:13.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535626336333165613530643463663662616331316561353335623730 Jul 2 01:52:13.496000 audit: BPF prog-id=184 op=UNLOAD Jul 2 01:52:13.496000 audit: BPF prog-id=183 op=UNLOAD Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:13.496000 audit: BPF prog-id=185 op=LOAD Jul 2 01:52:13.496000 audit[4574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4565 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:13.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535626336333165613530643463663662616331316561353335623730 Jul 2 01:52:13.518344 env[1468]: time="2024-07-02T01:52:13.518301779Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75bdf5bdf7-hc2tv,Uid:d2a3e0c3-dfe1-499a-a408-b6d93c00724a,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89\"" Jul 2 01:52:14.428964 systemd-networkd[1605]: calic5bfeb9a120: Gained IPv6LL Jul 2 01:52:14.492963 systemd-networkd[1605]: cali28540de81d5: Gained IPv6LL Jul 2 01:52:15.862248 env[1468]: time="2024-07-02T01:52:15.862208680Z" level=info msg="StopPodSandbox for \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\"" Jul 2 01:52:16.001729 env[1468]: 2024-07-02 01:52:15.946 [WARNING][4626] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"c04d0a21-b743-4537-bbf9-f6bf77a42e92", ResourceVersion:"756", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7", Pod:"coredns-5dd5756b68-6rqtp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.118.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic6edf2a5a60", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:16.001729 env[1468]: 2024-07-02 01:52:15.946 [INFO][4626] k8s.go 608: Cleaning up netns ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Jul 2 01:52:16.001729 env[1468]: 2024-07-02 01:52:15.946 [INFO][4626] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" iface="eth0" netns="" Jul 2 01:52:16.001729 env[1468]: 2024-07-02 01:52:15.946 [INFO][4626] k8s.go 615: Releasing IP address(es) ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Jul 2 01:52:16.001729 env[1468]: 2024-07-02 01:52:15.946 [INFO][4626] utils.go 188: Calico CNI releasing IP address ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Jul 2 01:52:16.001729 env[1468]: 2024-07-02 01:52:15.984 [INFO][4632] ipam_plugin.go 411: Releasing address using handleID ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" HandleID="k8s-pod-network.3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" Jul 2 01:52:16.001729 env[1468]: 2024-07-02 01:52:15.984 [INFO][4632] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:16.001729 env[1468]: 2024-07-02 01:52:15.984 [INFO][4632] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:16.001729 env[1468]: 2024-07-02 01:52:15.992 [WARNING][4632] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" HandleID="k8s-pod-network.3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" Jul 2 01:52:16.001729 env[1468]: 2024-07-02 01:52:15.993 [INFO][4632] ipam_plugin.go 439: Releasing address using workloadID ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" HandleID="k8s-pod-network.3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" Jul 2 01:52:16.001729 env[1468]: 2024-07-02 01:52:15.994 [INFO][4632] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:16.001729 env[1468]: 2024-07-02 01:52:16.000 [INFO][4626] k8s.go 621: Teardown processing complete. ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Jul 2 01:52:16.002336 env[1468]: time="2024-07-02T01:52:16.002300690Z" level=info msg="TearDown network for sandbox \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\" successfully" Jul 2 01:52:16.002402 env[1468]: time="2024-07-02T01:52:16.002386732Z" level=info msg="StopPodSandbox for \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\" returns successfully" Jul 2 01:52:16.003034 env[1468]: time="2024-07-02T01:52:16.003009310Z" level=info msg="RemovePodSandbox for \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\"" Jul 2 01:52:16.003175 env[1468]: time="2024-07-02T01:52:16.003137154Z" level=info msg="Forcibly stopping sandbox \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\"" Jul 2 01:52:16.146818 env[1468]: 2024-07-02 01:52:16.102 [WARNING][4651] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"c04d0a21-b743-4537-bbf9-f6bf77a42e92", ResourceVersion:"756", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"88cdf6e9f741efdd6166cbd16aa80ce7eb69c670d65148d480865e3c1f71e6c7", Pod:"coredns-5dd5756b68-6rqtp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.118.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic6edf2a5a60", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:16.146818 env[1468]: 2024-07-02 01:52:16.108 [INFO][4651] k8s.go 608: Cleaning up netns ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Jul 2 01:52:16.146818 env[1468]: 2024-07-02 01:52:16.108 [INFO][4651] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" iface="eth0" netns="" Jul 2 01:52:16.146818 env[1468]: 2024-07-02 01:52:16.109 [INFO][4651] k8s.go 615: Releasing IP address(es) ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Jul 2 01:52:16.146818 env[1468]: 2024-07-02 01:52:16.109 [INFO][4651] utils.go 188: Calico CNI releasing IP address ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Jul 2 01:52:16.146818 env[1468]: 2024-07-02 01:52:16.132 [INFO][4659] ipam_plugin.go 411: Releasing address using handleID ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" HandleID="k8s-pod-network.3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" Jul 2 01:52:16.146818 env[1468]: 2024-07-02 01:52:16.133 [INFO][4659] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:16.146818 env[1468]: 2024-07-02 01:52:16.133 [INFO][4659] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:16.146818 env[1468]: 2024-07-02 01:52:16.142 [WARNING][4659] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" HandleID="k8s-pod-network.3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" Jul 2 01:52:16.146818 env[1468]: 2024-07-02 01:52:16.142 [INFO][4659] ipam_plugin.go 439: Releasing address using workloadID ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" HandleID="k8s-pod-network.3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--6rqtp-eth0" Jul 2 01:52:16.146818 env[1468]: 2024-07-02 01:52:16.144 [INFO][4659] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:16.146818 env[1468]: 2024-07-02 01:52:16.145 [INFO][4651] k8s.go 621: Teardown processing complete. ContainerID="3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f" Jul 2 01:52:16.147879 env[1468]: time="2024-07-02T01:52:16.146777387Z" level=info msg="TearDown network for sandbox \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\" successfully" Jul 2 01:52:16.180347 env[1468]: time="2024-07-02T01:52:16.180295347Z" level=info msg="RemovePodSandbox \"3e03caae966df3303b78dd3b3dd04e7700c93f2d62c3e419dd13ef068dd2bd2f\" returns successfully" Jul 2 01:52:16.181084 env[1468]: time="2024-07-02T01:52:16.181061969Z" level=info msg="StopPodSandbox for \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\"" Jul 2 01:52:16.191129 env[1468]: time="2024-07-02T01:52:16.191080616Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:16.202185 env[1468]: time="2024-07-02T01:52:16.202139452Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cfbcd2d846bffa8495396cef27ce876ed8ebd8e36f660b8dd9326c1ff4d770ac,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:16.207106 env[1468]: time="2024-07-02T01:52:16.207064514Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:16.212598 env[1468]: time="2024-07-02T01:52:16.212552631Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:16.213396 env[1468]: time="2024-07-02T01:52:16.213029844Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:cfbcd2d846bffa8495396cef27ce876ed8ebd8e36f660b8dd9326c1ff4d770ac\"" Jul 2 01:52:16.215793 env[1468]: time="2024-07-02T01:52:16.215760843Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 01:52:16.216989 env[1468]: time="2024-07-02T01:52:16.216929716Z" level=info msg="CreateContainer within sandbox \"464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 01:52:16.250790 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2307210706.mount: Deactivated successfully. Jul 2 01:52:16.271006 env[1468]: time="2024-07-02T01:52:16.270947223Z" level=info msg="CreateContainer within sandbox \"464b396f3de770cd0089f8c0bf59eedcef95ce6ee7cda0360bbf89e9aca38013\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"568fa3fccf7896d2478eb0c2d851ec6a7b402914f4a83a673a834c1c83ba435f\"" Jul 2 01:52:16.271734 env[1468]: time="2024-07-02T01:52:16.271701244Z" level=info msg="StartContainer for \"568fa3fccf7896d2478eb0c2d851ec6a7b402914f4a83a673a834c1c83ba435f\"" Jul 2 01:52:16.292199 env[1468]: 2024-07-02 01:52:16.229 [WARNING][4677] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0a1ebfc4-789b-4005-bedf-61c880e9e47c", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd", Pod:"csi-node-driver-x8j4l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.118.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia76ccec04d0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:16.292199 env[1468]: 2024-07-02 01:52:16.229 [INFO][4677] k8s.go 608: Cleaning up netns ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Jul 2 01:52:16.292199 env[1468]: 2024-07-02 01:52:16.229 [INFO][4677] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" iface="eth0" netns="" Jul 2 01:52:16.292199 env[1468]: 2024-07-02 01:52:16.229 [INFO][4677] k8s.go 615: Releasing IP address(es) ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Jul 2 01:52:16.292199 env[1468]: 2024-07-02 01:52:16.229 [INFO][4677] utils.go 188: Calico CNI releasing IP address ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Jul 2 01:52:16.292199 env[1468]: 2024-07-02 01:52:16.264 [INFO][4684] ipam_plugin.go 411: Releasing address using handleID ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" HandleID="k8s-pod-network.be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Workload="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" Jul 2 01:52:16.292199 env[1468]: 2024-07-02 01:52:16.265 [INFO][4684] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:16.292199 env[1468]: 2024-07-02 01:52:16.265 [INFO][4684] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:16.292199 env[1468]: 2024-07-02 01:52:16.278 [WARNING][4684] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" HandleID="k8s-pod-network.be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Workload="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" Jul 2 01:52:16.292199 env[1468]: 2024-07-02 01:52:16.278 [INFO][4684] ipam_plugin.go 439: Releasing address using workloadID ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" HandleID="k8s-pod-network.be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Workload="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" Jul 2 01:52:16.292199 env[1468]: 2024-07-02 01:52:16.281 [INFO][4684] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:16.292199 env[1468]: 2024-07-02 01:52:16.285 [INFO][4677] k8s.go 621: Teardown processing complete. ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Jul 2 01:52:16.292761 env[1468]: time="2024-07-02T01:52:16.292715446Z" level=info msg="TearDown network for sandbox \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\" successfully" Jul 2 01:52:16.292857 env[1468]: time="2024-07-02T01:52:16.292839850Z" level=info msg="StopPodSandbox for \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\" returns successfully" Jul 2 01:52:16.294617 env[1468]: time="2024-07-02T01:52:16.293765996Z" level=info msg="RemovePodSandbox for \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\"" Jul 2 01:52:16.294617 env[1468]: time="2024-07-02T01:52:16.293825438Z" level=info msg="Forcibly stopping sandbox \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\"" Jul 2 01:52:16.298546 systemd[1]: Started cri-containerd-568fa3fccf7896d2478eb0c2d851ec6a7b402914f4a83a673a834c1c83ba435f.scope. Jul 2 01:52:16.361869 kernel: kauditd_printk_skb: 232 callbacks suppressed Jul 2 01:52:16.361993 kernel: audit: type=1400 audit(1719885136.337:1234): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.390384 kernel: audit: type=1400 audit(1719885136.337:1235): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.408153 kernel: audit: type=1400 audit(1719885136.337:1236): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.426516 kernel: audit: type=1400 audit(1719885136.337:1237): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.444102 kernel: audit: type=1400 audit(1719885136.337:1238): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.462869 kernel: audit: type=1400 audit(1719885136.337:1239): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.480839 kernel: audit: type=1400 audit(1719885136.337:1240): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.498467 kernel: audit: type=1400 audit(1719885136.337:1241): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.498959 env[1468]: time="2024-07-02T01:52:16.498916031Z" level=info msg="StartContainer for \"568fa3fccf7896d2478eb0c2d851ec6a7b402914f4a83a673a834c1c83ba435f\" returns successfully" Jul 2 01:52:16.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.515671 kernel: audit: type=1400 audit(1719885136.337:1242): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.536671 kernel: audit: type=1400 audit(1719885136.337:1243): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.337000 audit: BPF prog-id=186 op=LOAD Jul 2 01:52:16.338000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.539170 env[1468]: 2024-07-02 01:52:16.409 [WARNING][4732] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0a1ebfc4-789b-4005-bedf-61c880e9e47c", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"7d638e91853a84dfe2947693a5244ca3d6846d8ca754dd67791c68bf9e0346cd", Pod:"csi-node-driver-x8j4l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.118.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia76ccec04d0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:16.539170 env[1468]: 2024-07-02 01:52:16.410 [INFO][4732] k8s.go 608: Cleaning up netns ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Jul 2 01:52:16.539170 env[1468]: 2024-07-02 01:52:16.410 [INFO][4732] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" iface="eth0" netns="" Jul 2 01:52:16.539170 env[1468]: 2024-07-02 01:52:16.410 [INFO][4732] k8s.go 615: Releasing IP address(es) ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Jul 2 01:52:16.539170 env[1468]: 2024-07-02 01:52:16.410 [INFO][4732] utils.go 188: Calico CNI releasing IP address ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Jul 2 01:52:16.539170 env[1468]: 2024-07-02 01:52:16.478 [INFO][4738] ipam_plugin.go 411: Releasing address using handleID ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" HandleID="k8s-pod-network.be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Workload="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" Jul 2 01:52:16.539170 env[1468]: 2024-07-02 01:52:16.482 [INFO][4738] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:16.539170 env[1468]: 2024-07-02 01:52:16.482 [INFO][4738] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:16.539170 env[1468]: 2024-07-02 01:52:16.500 [WARNING][4738] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" HandleID="k8s-pod-network.be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Workload="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" Jul 2 01:52:16.539170 env[1468]: 2024-07-02 01:52:16.500 [INFO][4738] ipam_plugin.go 439: Releasing address using workloadID ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" HandleID="k8s-pod-network.be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Workload="ci--3510.3.5--a--6c47a6a388-k8s-csi--node--driver--x8j4l-eth0" Jul 2 01:52:16.539170 env[1468]: 2024-07-02 01:52:16.517 [INFO][4738] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:16.539170 env[1468]: 2024-07-02 01:52:16.538 [INFO][4732] k8s.go 621: Teardown processing complete. ContainerID="be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06" Jul 2 01:52:16.539662 env[1468]: time="2024-07-02T01:52:16.539143863Z" level=info msg="TearDown network for sandbox \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\" successfully" Jul 2 01:52:16.338000 audit[4700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4520 pid=4700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536386661336663636637383936643234373865623063326438353165 Jul 2 01:52:16.338000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.338000 audit[4700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4520 pid=4700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536386661336663636637383936643234373865623063326438353165 Jul 2 01:52:16.338000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.338000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.338000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.338000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.338000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.338000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.338000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.338000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.338000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.338000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.338000 audit: BPF prog-id=187 op=LOAD Jul 2 01:52:16.338000 audit[4700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4520 pid=4700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536386661336663636637383936643234373865623063326438353165 Jul 2 01:52:16.344000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.344000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.344000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.344000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.344000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.344000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.344000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.344000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.344000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.344000 audit: BPF prog-id=188 op=LOAD Jul 2 01:52:16.344000 audit[4700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4520 pid=4700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536386661336663636637383936643234373865623063326438353165 Jul 2 01:52:16.360000 audit: BPF prog-id=188 op=UNLOAD Jul 2 01:52:16.360000 audit: BPF prog-id=187 op=UNLOAD Jul 2 01:52:16.360000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.360000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.360000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.360000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.360000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.360000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.360000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.360000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.360000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.360000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.360000 audit: BPF prog-id=189 op=LOAD Jul 2 01:52:16.360000 audit[4700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4520 pid=4700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536386661336663636637383936643234373865623063326438353165 Jul 2 01:52:16.556082 env[1468]: time="2024-07-02T01:52:16.556019066Z" level=info msg="RemovePodSandbox \"be09487bb2d114493e276919ddbbf1941e88a903515dc87a90b11a789053ba06\" returns successfully" Jul 2 01:52:16.560039 env[1468]: time="2024-07-02T01:52:16.559986900Z" level=info msg="StopPodSandbox for \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\"" Jul 2 01:52:16.593644 env[1468]: time="2024-07-02T01:52:16.593578942Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:16.600955 env[1468]: time="2024-07-02T01:52:16.600903071Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:cfbcd2d846bffa8495396cef27ce876ed8ebd8e36f660b8dd9326c1ff4d770ac,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:16.606950 env[1468]: time="2024-07-02T01:52:16.606896883Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:16.612433 env[1468]: time="2024-07-02T01:52:16.612389240Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:16.613260 env[1468]: time="2024-07-02T01:52:16.612883374Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:cfbcd2d846bffa8495396cef27ce876ed8ebd8e36f660b8dd9326c1ff4d770ac\"" Jul 2 01:52:16.616830 env[1468]: time="2024-07-02T01:52:16.616766886Z" level=info msg="CreateContainer within sandbox \"e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 01:52:16.663764 env[1468]: time="2024-07-02T01:52:16.663643388Z" level=info msg="CreateContainer within sandbox \"e5bc631ea50d4cf6bac11ea535b7068ab9db9fb925209eeb9ac284de76cdea89\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"92545b4ef673ac971d2a30fc6850a4ca0804dadd870efa2f79d44dc79ff0cd5b\"" Jul 2 01:52:16.666547 env[1468]: time="2024-07-02T01:52:16.666498270Z" level=info msg="StartContainer for \"92545b4ef673ac971d2a30fc6850a4ca0804dadd870efa2f79d44dc79ff0cd5b\"" Jul 2 01:52:16.683684 env[1468]: 2024-07-02 01:52:16.631 [WARNING][4768] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0", GenerateName:"calico-kube-controllers-6456d768b7-", Namespace:"calico-system", SelfLink:"", UID:"87736a6b-5853-42b9-90a8-2fa967051fc1", ResourceVersion:"773", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6456d768b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7", Pod:"calico-kube-controllers-6456d768b7-p5gwp", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.118.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicf6ca055468", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:16.683684 env[1468]: 2024-07-02 01:52:16.631 [INFO][4768] k8s.go 608: Cleaning up netns ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Jul 2 01:52:16.683684 env[1468]: 2024-07-02 01:52:16.631 [INFO][4768] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" iface="eth0" netns="" Jul 2 01:52:16.683684 env[1468]: 2024-07-02 01:52:16.631 [INFO][4768] k8s.go 615: Releasing IP address(es) ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Jul 2 01:52:16.683684 env[1468]: 2024-07-02 01:52:16.631 [INFO][4768] utils.go 188: Calico CNI releasing IP address ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Jul 2 01:52:16.683684 env[1468]: 2024-07-02 01:52:16.664 [INFO][4774] ipam_plugin.go 411: Releasing address using handleID ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" HandleID="k8s-pod-network.a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" Jul 2 01:52:16.683684 env[1468]: 2024-07-02 01:52:16.664 [INFO][4774] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:16.683684 env[1468]: 2024-07-02 01:52:16.664 [INFO][4774] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:16.683684 env[1468]: 2024-07-02 01:52:16.678 [WARNING][4774] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" HandleID="k8s-pod-network.a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" Jul 2 01:52:16.683684 env[1468]: 2024-07-02 01:52:16.678 [INFO][4774] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" HandleID="k8s-pod-network.a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" Jul 2 01:52:16.683684 env[1468]: 2024-07-02 01:52:16.680 [INFO][4774] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:16.683684 env[1468]: 2024-07-02 01:52:16.681 [INFO][4768] k8s.go 621: Teardown processing complete. ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Jul 2 01:52:16.684257 env[1468]: time="2024-07-02T01:52:16.684210337Z" level=info msg="TearDown network for sandbox \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\" successfully" Jul 2 01:52:16.684334 env[1468]: time="2024-07-02T01:52:16.684316460Z" level=info msg="StopPodSandbox for \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\" returns successfully" Jul 2 01:52:16.684941 env[1468]: time="2024-07-02T01:52:16.684917957Z" level=info msg="RemovePodSandbox for \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\"" Jul 2 01:52:16.685098 env[1468]: time="2024-07-02T01:52:16.685060961Z" level=info msg="Forcibly stopping sandbox \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\"" Jul 2 01:52:16.689526 systemd[1]: Started cri-containerd-92545b4ef673ac971d2a30fc6850a4ca0804dadd870efa2f79d44dc79ff0cd5b.scope. Jul 2 01:52:16.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.733000 audit: BPF prog-id=190 op=LOAD Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4565 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932353435623465663637336163393731643261333066633638353061 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4565 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932353435623465663637336163393731643261333066633638353061 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit: BPF prog-id=191 op=LOAD Jul 2 01:52:16.734000 audit[4788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4565 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932353435623465663637336163393731643261333066633638353061 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit: BPF prog-id=192 op=LOAD Jul 2 01:52:16.734000 audit[4788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4565 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932353435623465663637336163393731643261333066633638353061 Jul 2 01:52:16.734000 audit: BPF prog-id=192 op=UNLOAD Jul 2 01:52:16.734000 audit: BPF prog-id=191 op=UNLOAD Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.734000 audit: BPF prog-id=193 op=LOAD Jul 2 01:52:16.734000 audit[4788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4565 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932353435623465663637336163393731643261333066633638353061 Jul 2 01:52:16.784910 env[1468]: 2024-07-02 01:52:16.742 [WARNING][4813] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0", GenerateName:"calico-kube-controllers-6456d768b7-", Namespace:"calico-system", SelfLink:"", UID:"87736a6b-5853-42b9-90a8-2fa967051fc1", ResourceVersion:"773", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6456d768b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"46169bff9ef1c474dc355c8dc668fc99cec8fa86b10c164c141b49fb0f7a29c7", Pod:"calico-kube-controllers-6456d768b7-p5gwp", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.118.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicf6ca055468", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:16.784910 env[1468]: 2024-07-02 01:52:16.742 [INFO][4813] k8s.go 608: Cleaning up netns ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Jul 2 01:52:16.784910 env[1468]: 2024-07-02 01:52:16.742 [INFO][4813] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" iface="eth0" netns="" Jul 2 01:52:16.784910 env[1468]: 2024-07-02 01:52:16.742 [INFO][4813] k8s.go 615: Releasing IP address(es) ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Jul 2 01:52:16.784910 env[1468]: 2024-07-02 01:52:16.742 [INFO][4813] utils.go 188: Calico CNI releasing IP address ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Jul 2 01:52:16.784910 env[1468]: 2024-07-02 01:52:16.766 [INFO][4826] ipam_plugin.go 411: Releasing address using handleID ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" HandleID="k8s-pod-network.a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" Jul 2 01:52:16.784910 env[1468]: 2024-07-02 01:52:16.766 [INFO][4826] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:16.784910 env[1468]: 2024-07-02 01:52:16.766 [INFO][4826] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:16.784910 env[1468]: 2024-07-02 01:52:16.778 [WARNING][4826] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" HandleID="k8s-pod-network.a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" Jul 2 01:52:16.784910 env[1468]: 2024-07-02 01:52:16.778 [INFO][4826] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" HandleID="k8s-pod-network.a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Workload="ci--3510.3.5--a--6c47a6a388-k8s-calico--kube--controllers--6456d768b7--p5gwp-eth0" Jul 2 01:52:16.784910 env[1468]: 2024-07-02 01:52:16.782 [INFO][4826] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:16.784910 env[1468]: 2024-07-02 01:52:16.783 [INFO][4813] k8s.go 621: Teardown processing complete. ContainerID="a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3" Jul 2 01:52:16.785368 env[1468]: time="2024-07-02T01:52:16.784935501Z" level=info msg="TearDown network for sandbox \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\" successfully" Jul 2 01:52:16.794731 env[1468]: time="2024-07-02T01:52:16.794682380Z" level=info msg="StartContainer for \"92545b4ef673ac971d2a30fc6850a4ca0804dadd870efa2f79d44dc79ff0cd5b\" returns successfully" Jul 2 01:52:16.798231 env[1468]: time="2024-07-02T01:52:16.798178121Z" level=info msg="RemovePodSandbox \"a02ddb6d073a56d5a4f3ccecf3fef9cb72389191a806a2a341678ee2de73a8e3\" returns successfully" Jul 2 01:52:16.798687 env[1468]: time="2024-07-02T01:52:16.798656454Z" level=info msg="StopPodSandbox for \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\"" Jul 2 01:52:16.878637 env[1468]: 2024-07-02 01:52:16.839 [WARNING][4858] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"cd129927-de23-4f7e-818e-a81e909f547e", ResourceVersion:"722", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8", Pod:"coredns-5dd5756b68-mq8sg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.118.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali20423fd05de", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:16.878637 env[1468]: 2024-07-02 01:52:16.839 [INFO][4858] k8s.go 608: Cleaning up netns ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Jul 2 01:52:16.878637 env[1468]: 2024-07-02 01:52:16.839 [INFO][4858] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" iface="eth0" netns="" Jul 2 01:52:16.878637 env[1468]: 2024-07-02 01:52:16.839 [INFO][4858] k8s.go 615: Releasing IP address(es) ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Jul 2 01:52:16.878637 env[1468]: 2024-07-02 01:52:16.839 [INFO][4858] utils.go 188: Calico CNI releasing IP address ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Jul 2 01:52:16.878637 env[1468]: 2024-07-02 01:52:16.861 [INFO][4864] ipam_plugin.go 411: Releasing address using handleID ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" HandleID="k8s-pod-network.d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" Jul 2 01:52:16.878637 env[1468]: 2024-07-02 01:52:16.861 [INFO][4864] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:16.878637 env[1468]: 2024-07-02 01:52:16.861 [INFO][4864] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:16.878637 env[1468]: 2024-07-02 01:52:16.872 [WARNING][4864] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" HandleID="k8s-pod-network.d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" Jul 2 01:52:16.878637 env[1468]: 2024-07-02 01:52:16.872 [INFO][4864] ipam_plugin.go 439: Releasing address using workloadID ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" HandleID="k8s-pod-network.d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" Jul 2 01:52:16.878637 env[1468]: 2024-07-02 01:52:16.875 [INFO][4864] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:16.878637 env[1468]: 2024-07-02 01:52:16.877 [INFO][4858] k8s.go 621: Teardown processing complete. ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Jul 2 01:52:16.879276 env[1468]: time="2024-07-02T01:52:16.878665105Z" level=info msg="TearDown network for sandbox \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\" successfully" Jul 2 01:52:16.879276 env[1468]: time="2024-07-02T01:52:16.878697386Z" level=info msg="StopPodSandbox for \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\" returns successfully" Jul 2 01:52:16.879276 env[1468]: time="2024-07-02T01:52:16.879163440Z" level=info msg="RemovePodSandbox for \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\"" Jul 2 01:52:16.879276 env[1468]: time="2024-07-02T01:52:16.879194241Z" level=info msg="Forcibly stopping sandbox \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\"" Jul 2 01:52:16.967225 env[1468]: 2024-07-02 01:52:16.924 [WARNING][4884] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"cd129927-de23-4f7e-818e-a81e909f547e", ResourceVersion:"722", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-6c47a6a388", ContainerID:"48195aa2b3da90d4a1f9370ff37bc405d61ff31270f3a579920dbdee161d62a8", Pod:"coredns-5dd5756b68-mq8sg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.118.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali20423fd05de", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:16.967225 env[1468]: 2024-07-02 01:52:16.924 [INFO][4884] k8s.go 608: Cleaning up netns ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Jul 2 01:52:16.967225 env[1468]: 2024-07-02 01:52:16.924 [INFO][4884] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" iface="eth0" netns="" Jul 2 01:52:16.967225 env[1468]: 2024-07-02 01:52:16.924 [INFO][4884] k8s.go 615: Releasing IP address(es) ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Jul 2 01:52:16.967225 env[1468]: 2024-07-02 01:52:16.924 [INFO][4884] utils.go 188: Calico CNI releasing IP address ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Jul 2 01:52:16.967225 env[1468]: 2024-07-02 01:52:16.952 [INFO][4890] ipam_plugin.go 411: Releasing address using handleID ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" HandleID="k8s-pod-network.d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" Jul 2 01:52:16.967225 env[1468]: 2024-07-02 01:52:16.952 [INFO][4890] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:16.967225 env[1468]: 2024-07-02 01:52:16.952 [INFO][4890] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:16.967225 env[1468]: 2024-07-02 01:52:16.962 [WARNING][4890] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" HandleID="k8s-pod-network.d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" Jul 2 01:52:16.967225 env[1468]: 2024-07-02 01:52:16.962 [INFO][4890] ipam_plugin.go 439: Releasing address using workloadID ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" HandleID="k8s-pod-network.d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Workload="ci--3510.3.5--a--6c47a6a388-k8s-coredns--5dd5756b68--mq8sg-eth0" Jul 2 01:52:16.967225 env[1468]: 2024-07-02 01:52:16.964 [INFO][4890] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:16.967225 env[1468]: 2024-07-02 01:52:16.965 [INFO][4884] k8s.go 621: Teardown processing complete. ContainerID="d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9" Jul 2 01:52:16.967225 env[1468]: time="2024-07-02T01:52:16.967193160Z" level=info msg="TearDown network for sandbox \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\" successfully" Jul 2 01:52:16.978209 env[1468]: time="2024-07-02T01:52:16.978157354Z" level=info msg="RemovePodSandbox \"d016fbb1feaa49e48c2c9232abb3baeeb0a3e32d6c5513b76f7827135e1d41b9\" returns successfully" Jul 2 01:52:17.054000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:17.054000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a1f020 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:52:17.054000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:52:17.055000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:17.055000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a1f060 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:52:17.055000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:52:17.056000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:17.056000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:17.056000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a1f480 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:52:17.056000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:52:17.056000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002ae74a0 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:52:17.056000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:52:17.094234 kubelet[2577]: I0702 01:52:17.094188 2577 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-75bdf5bdf7-psmch" podStartSLOduration=3.354355737 podCreationTimestamp="2024-07-02 01:52:11 +0000 UTC" firstStartedPulling="2024-07-02 01:52:13.47427104 +0000 UTC m=+57.729926603" lastFinishedPulling="2024-07-02 01:52:16.214063594 +0000 UTC m=+60.469719117" observedRunningTime="2024-07-02 01:52:17.094081489 +0000 UTC m=+61.349737052" watchObservedRunningTime="2024-07-02 01:52:17.094148251 +0000 UTC m=+61.349803774" Jul 2 01:52:17.094678 kubelet[2577]: I0702 01:52:17.094424 2577 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-75bdf5bdf7-hc2tv" podStartSLOduration=3.000519484 podCreationTimestamp="2024-07-02 01:52:11 +0000 UTC" firstStartedPulling="2024-07-02 01:52:13.519975308 +0000 UTC m=+57.775630871" lastFinishedPulling="2024-07-02 01:52:16.613858802 +0000 UTC m=+60.869514365" observedRunningTime="2024-07-02 01:52:17.083058296 +0000 UTC m=+61.338713859" watchObservedRunningTime="2024-07-02 01:52:17.094402978 +0000 UTC m=+61.350058501" Jul 2 01:52:17.121000 audit[4900]: NETFILTER_CFG table=filter:122 family=2 entries=10 op=nft_register_rule pid=4900 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:17.121000 audit[4900]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffef225e00 a2=0 a3=1 items=0 ppid=2755 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.121000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:17.122000 audit[4900]: NETFILTER_CFG table=nat:123 family=2 entries=20 op=nft_register_rule pid=4900 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:17.122000 audit[4900]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffef225e00 a2=0 a3=1 items=0 ppid=2755 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.122000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:17.138000 audit[4902]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=4902 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:17.138000 audit[4902]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffb465550 a2=0 a3=1 items=0 ppid=2755 pid=4902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.138000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:17.139000 audit[4902]: NETFILTER_CFG table=nat:125 family=2 entries=20 op=nft_register_rule pid=4902 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:17.139000 audit[4902]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffb465550 a2=0 a3=1 items=0 ppid=2755 pid=4902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.139000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:17.245658 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1865100665.mount: Deactivated successfully. Jul 2 01:52:17.696000 audit[4723]: AVC avc: denied { watch } for pid=4723 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_12.3852504002/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c501 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c392,c501 tclass=file permissive=0 Jul 2 01:52:17.696000 audit[4723]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400040bf60 a2=fc6 a3=0 items=0 ppid=4520 pid=4723 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c501 key=(null) Jul 2 01:52:17.696000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:52:18.079625 kubelet[2577]: I0702 01:52:18.079590 2577 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 01:52:18.080196 kubelet[2577]: I0702 01:52:18.080172 2577 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 01:52:18.823000 audit[4819]: AVC avc: denied { watch } for pid=4819 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_12.540488295/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c671,c892 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c671,c892 tclass=file permissive=0 Jul 2 01:52:18.823000 audit[4819]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000c9ffa0 a2=fc6 a3=0 items=0 ppid=4565 pid=4819 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c671,c892 key=(null) Jul 2 01:52:18.823000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:52:19.746080 systemd[1]: run-containerd-runc-k8s.io-2138fa7b34eebd4db73c5c430ba820a5f7f8139a4148f9f556cb4829b12aa281-runc.VuNCnJ.mount: Deactivated successfully. Jul 2 01:52:39.025990 systemd[1]: run-containerd-runc-k8s.io-51d203fa79ffe8596bb00cd8d734cbc4660338a3fd4989abcc4ab06e94ac0bcd-runc.M8TXsx.mount: Deactivated successfully. Jul 2 01:52:46.024936 update_engine[1438]: I0702 01:52:46.024893 1438 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Jul 2 01:52:46.024936 update_engine[1438]: I0702 01:52:46.024930 1438 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Jul 2 01:52:46.025452 update_engine[1438]: I0702 01:52:46.025424 1438 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Jul 2 01:52:46.026104 update_engine[1438]: I0702 01:52:46.026083 1438 omaha_request_params.cc:62] Current group set to lts Jul 2 01:52:46.026199 update_engine[1438]: I0702 01:52:46.026181 1438 update_attempter.cc:499] Already updated boot flags. Skipping. Jul 2 01:52:46.026199 update_engine[1438]: I0702 01:52:46.026192 1438 update_attempter.cc:643] Scheduling an action processor start. Jul 2 01:52:46.026255 update_engine[1438]: I0702 01:52:46.026207 1438 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jul 2 01:52:46.026255 update_engine[1438]: I0702 01:52:46.026230 1438 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Jul 2 01:52:46.027723 locksmithd[1531]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Jul 2 01:52:46.044365 update_engine[1438]: I0702 01:52:46.044337 1438 omaha_request_action.cc:270] Posting an Omaha request to disabled Jul 2 01:52:46.044365 update_engine[1438]: I0702 01:52:46.044358 1438 omaha_request_action.cc:271] Request: Jul 2 01:52:46.044365 update_engine[1438]: Jul 2 01:52:46.044365 update_engine[1438]: Jul 2 01:52:46.044365 update_engine[1438]: Jul 2 01:52:46.044365 update_engine[1438]: Jul 2 01:52:46.044365 update_engine[1438]: Jul 2 01:52:46.044365 update_engine[1438]: Jul 2 01:52:46.044365 update_engine[1438]: Jul 2 01:52:46.044365 update_engine[1438]: Jul 2 01:52:46.044365 update_engine[1438]: I0702 01:52:46.044364 1438 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 01:52:46.115489 update_engine[1438]: I0702 01:52:46.115451 1438 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 01:52:46.115780 update_engine[1438]: I0702 01:52:46.115758 1438 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 01:52:46.127156 update_engine[1438]: E0702 01:52:46.127128 1438 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 01:52:46.127265 update_engine[1438]: I0702 01:52:46.127246 1438 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Jul 2 01:52:54.301735 kubelet[2577]: I0702 01:52:54.301700 2577 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 01:52:54.346000 audit[5011]: NETFILTER_CFG table=filter:126 family=2 entries=9 op=nft_register_rule pid=5011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:54.352138 kernel: kauditd_printk_skb: 134 callbacks suppressed Jul 2 01:52:54.352204 kernel: audit: type=1325 audit(1719885174.346:1280): table=filter:126 family=2 entries=9 op=nft_register_rule pid=5011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:54.346000 audit[5011]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffdb20c280 a2=0 a3=1 items=0 ppid=2755 pid=5011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:54.390831 kernel: audit: type=1300 audit(1719885174.346:1280): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffdb20c280 a2=0 a3=1 items=0 ppid=2755 pid=5011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:54.346000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:54.404108 kernel: audit: type=1327 audit(1719885174.346:1280): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:54.347000 audit[5011]: NETFILTER_CFG table=nat:127 family=2 entries=27 op=nft_register_chain pid=5011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:54.417974 kernel: audit: type=1325 audit(1719885174.347:1281): table=nat:127 family=2 entries=27 op=nft_register_chain pid=5011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:54.347000 audit[5011]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffdb20c280 a2=0 a3=1 items=0 ppid=2755 pid=5011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:54.443947 kernel: audit: type=1300 audit(1719885174.347:1281): arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffdb20c280 a2=0 a3=1 items=0 ppid=2755 pid=5011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:54.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:54.457073 kernel: audit: type=1327 audit(1719885174.347:1281): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:56.007367 update_engine[1438]: I0702 01:52:56.007311 1438 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 01:52:56.007745 update_engine[1438]: I0702 01:52:56.007567 1438 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 01:52:56.007777 update_engine[1438]: I0702 01:52:56.007764 1438 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 01:52:56.115795 update_engine[1438]: E0702 01:52:56.115748 1438 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 01:52:56.115972 update_engine[1438]: I0702 01:52:56.115887 1438 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Jul 2 01:52:56.297764 kubelet[2577]: I0702 01:52:56.297663 2577 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 01:52:56.332000 audit[5013]: NETFILTER_CFG table=filter:128 family=2 entries=8 op=nft_register_rule pid=5013 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:56.332000 audit[5013]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd84fdcf0 a2=0 a3=1 items=0 ppid=2755 pid=5013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:56.373194 kernel: audit: type=1325 audit(1719885176.332:1282): table=filter:128 family=2 entries=8 op=nft_register_rule pid=5013 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:56.373345 kernel: audit: type=1300 audit(1719885176.332:1282): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd84fdcf0 a2=0 a3=1 items=0 ppid=2755 pid=5013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:56.332000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:56.386075 kernel: audit: type=1327 audit(1719885176.332:1282): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:56.372000 audit[5013]: NETFILTER_CFG table=nat:129 family=2 entries=34 op=nft_register_chain pid=5013 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:56.399195 kernel: audit: type=1325 audit(1719885176.372:1283): table=nat:129 family=2 entries=34 op=nft_register_chain pid=5013 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:56.372000 audit[5013]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffd84fdcf0 a2=0 a3=1 items=0 ppid=2755 pid=5013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:56.372000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:53:06.005754 update_engine[1438]: I0702 01:53:06.005713 1438 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 01:53:06.006099 update_engine[1438]: I0702 01:53:06.005936 1438 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 01:53:06.006132 update_engine[1438]: I0702 01:53:06.006119 1438 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 01:53:06.014365 update_engine[1438]: E0702 01:53:06.014335 1438 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 01:53:06.014513 update_engine[1438]: I0702 01:53:06.014456 1438 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Jul 2 01:53:12.179000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:12.185893 kernel: kauditd_printk_skb: 2 callbacks suppressed Jul 2 01:53:12.186005 kernel: audit: type=1400 audit(1719885192.179:1284): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:12.180000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:12.232544 kernel: audit: type=1400 audit(1719885192.180:1285): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:12.232718 kernel: audit: type=1300 audit(1719885192.179:1284): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b98720 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:53:12.179000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b98720 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:53:12.179000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:12.286530 kernel: audit: type=1327 audit(1719885192.179:1284): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:12.286687 kernel: audit: type=1300 audit(1719885192.180:1285): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400101a5d0 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:53:12.180000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400101a5d0 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:53:12.180000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:12.340104 kernel: audit: type=1327 audit(1719885192.180:1285): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:12.340281 kernel: audit: type=1400 audit(1719885192.286:1286): avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:12.286000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:12.286000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4007c45020 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:53:12.390809 kernel: audit: type=1300 audit(1719885192.286:1286): arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4007c45020 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:53:12.391037 kernel: audit: type=1327 audit(1719885192.286:1286): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:53:12.286000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:53:12.286000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:12.437491 kernel: audit: type=1400 audit(1719885192.286:1287): avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:12.286000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4007c45050 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:53:12.286000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:53:12.297000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:12.297000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4006338040 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:53:12.297000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:53:12.297000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:12.297000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4007c45290 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:53:12.297000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:53:12.314000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:12.314000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=40064a7960 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:53:12.314000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:12.314000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:53:12.314000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4007c45320 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:53:12.314000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:53:16.008396 update_engine[1438]: I0702 01:53:16.008358 1438 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 01:53:16.008705 update_engine[1438]: I0702 01:53:16.008554 1438 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 01:53:16.008789 update_engine[1438]: I0702 01:53:16.008739 1438 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 01:53:16.097665 update_engine[1438]: E0702 01:53:16.097628 1438 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 01:53:16.097866 update_engine[1438]: I0702 01:53:16.097730 1438 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Jul 2 01:53:16.097866 update_engine[1438]: I0702 01:53:16.097736 1438 omaha_request_action.cc:621] Omaha request response: Jul 2 01:53:16.097866 update_engine[1438]: E0702 01:53:16.097855 1438 omaha_request_action.cc:640] Omaha request network transfer failed. Jul 2 01:53:16.097944 update_engine[1438]: I0702 01:53:16.097870 1438 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Jul 2 01:53:16.097944 update_engine[1438]: I0702 01:53:16.097873 1438 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 01:53:16.097944 update_engine[1438]: I0702 01:53:16.097877 1438 update_attempter.cc:306] Processing Done. Jul 2 01:53:16.097944 update_engine[1438]: E0702 01:53:16.097889 1438 update_attempter.cc:619] Update failed. Jul 2 01:53:16.097944 update_engine[1438]: I0702 01:53:16.097892 1438 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Jul 2 01:53:16.097944 update_engine[1438]: I0702 01:53:16.097895 1438 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Jul 2 01:53:16.097944 update_engine[1438]: I0702 01:53:16.097899 1438 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Jul 2 01:53:16.098103 update_engine[1438]: I0702 01:53:16.097960 1438 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jul 2 01:53:16.098103 update_engine[1438]: I0702 01:53:16.097980 1438 omaha_request_action.cc:270] Posting an Omaha request to disabled Jul 2 01:53:16.098103 update_engine[1438]: I0702 01:53:16.097982 1438 omaha_request_action.cc:271] Request: Jul 2 01:53:16.098103 update_engine[1438]: Jul 2 01:53:16.098103 update_engine[1438]: Jul 2 01:53:16.098103 update_engine[1438]: Jul 2 01:53:16.098103 update_engine[1438]: Jul 2 01:53:16.098103 update_engine[1438]: Jul 2 01:53:16.098103 update_engine[1438]: Jul 2 01:53:16.098103 update_engine[1438]: I0702 01:53:16.097986 1438 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 01:53:16.098103 update_engine[1438]: I0702 01:53:16.098109 1438 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 01:53:16.098321 update_engine[1438]: I0702 01:53:16.098263 1438 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 2 01:53:16.098583 locksmithd[1531]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Jul 2 01:53:16.104767 update_engine[1438]: E0702 01:53:16.104739 1438 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 01:53:16.104860 update_engine[1438]: I0702 01:53:16.104840 1438 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Jul 2 01:53:16.104860 update_engine[1438]: I0702 01:53:16.104846 1438 omaha_request_action.cc:621] Omaha request response: Jul 2 01:53:16.104860 update_engine[1438]: I0702 01:53:16.104851 1438 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 01:53:16.104860 update_engine[1438]: I0702 01:53:16.104853 1438 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 01:53:16.104860 update_engine[1438]: I0702 01:53:16.104856 1438 update_attempter.cc:306] Processing Done. Jul 2 01:53:16.104860 update_engine[1438]: I0702 01:53:16.104861 1438 update_attempter.cc:310] Error event sent. Jul 2 01:53:16.104985 update_engine[1438]: I0702 01:53:16.104868 1438 update_check_scheduler.cc:74] Next update check in 42m0s Jul 2 01:53:16.105187 locksmithd[1531]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Jul 2 01:53:17.054000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:17.054000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d79580 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:53:17.054000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:17.056000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:17.056000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d79a00 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:53:17.056000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:17.058000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:17.058000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d79a40 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:53:17.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:17.058000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:17.058000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d79de0 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:53:17.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:17.699000 audit[4723]: AVC avc: denied { watch } for pid=4723 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_12.3852504002/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c501 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c392,c501 tclass=file permissive=0 Jul 2 01:53:17.705413 kernel: kauditd_printk_skb: 26 callbacks suppressed Jul 2 01:53:17.705504 kernel: audit: type=1400 audit(1719885197.699:1296): avc: denied { watch } for pid=4723 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_12.3852504002/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c501 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c392,c501 tclass=file permissive=0 Jul 2 01:53:17.699000 audit[4723]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400209c100 a2=fc6 a3=0 items=0 ppid=4520 pid=4723 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c501 key=(null) Jul 2 01:53:17.756142 kernel: audit: type=1300 audit(1719885197.699:1296): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400209c100 a2=fc6 a3=0 items=0 ppid=4520 pid=4723 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c501 key=(null) Jul 2 01:53:17.699000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:53:17.779541 kernel: audit: type=1327 audit(1719885197.699:1296): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:53:18.824000 audit[4819]: AVC avc: denied { watch } for pid=4819 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_12.540488295/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c671,c892 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c671,c892 tclass=file permissive=0 Jul 2 01:53:18.824000 audit[4819]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001eb3780 a2=fc6 a3=0 items=0 ppid=4565 pid=4819 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c671,c892 key=(null) Jul 2 01:53:18.875860 kernel: audit: type=1400 audit(1719885198.824:1297): avc: denied { watch } for pid=4819 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_12.540488295/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c671,c892 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c671,c892 tclass=file permissive=0 Jul 2 01:53:18.875965 kernel: audit: type=1300 audit(1719885198.824:1297): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001eb3780 a2=fc6 a3=0 items=0 ppid=4565 pid=4819 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c671,c892 key=(null) Jul 2 01:53:18.824000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:53:18.898657 kernel: audit: type=1327 audit(1719885198.824:1297): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:53:19.743848 systemd[1]: run-containerd-runc-k8s.io-2138fa7b34eebd4db73c5c430ba820a5f7f8139a4148f9f556cb4829b12aa281-runc.GI2jJL.mount: Deactivated successfully. Jul 2 01:53:45.271433 systemd[1]: Started sshd@7-10.200.20.4:22-10.200.16.10:35772.service. Jul 2 01:53:45.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.4:22-10.200.16.10:35772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:45.296857 kernel: audit: type=1130 audit(1719885225.270:1298): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.4:22-10.200.16.10:35772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:45.779358 sshd[5156]: Accepted publickey for core from 10.200.16.10 port 35772 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:53:45.778000 audit[5156]: USER_ACCT pid=5156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:45.802680 sshd[5156]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:53:45.801000 audit[5156]: CRED_ACQ pid=5156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:45.824330 kernel: audit: type=1101 audit(1719885225.778:1299): pid=5156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:45.824427 kernel: audit: type=1103 audit(1719885225.801:1300): pid=5156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:45.830562 systemd-logind[1435]: New session 10 of user core. Jul 2 01:53:45.841305 kernel: audit: type=1006 audit(1719885225.801:1301): pid=5156 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Jul 2 01:53:45.842612 systemd[1]: Started session-10.scope. Jul 2 01:53:45.801000 audit[5156]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe44bb680 a2=3 a3=1 items=0 ppid=1 pid=5156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:45.864568 kernel: audit: type=1300 audit(1719885225.801:1301): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe44bb680 a2=3 a3=1 items=0 ppid=1 pid=5156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:45.801000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:53:45.872564 kernel: audit: type=1327 audit(1719885225.801:1301): proctitle=737368643A20636F7265205B707269765D Jul 2 01:53:45.872000 audit[5156]: USER_START pid=5156 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:45.872000 audit[5158]: CRED_ACQ pid=5158 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:45.916568 kernel: audit: type=1105 audit(1719885225.872:1302): pid=5156 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:45.916702 kernel: audit: type=1103 audit(1719885225.872:1303): pid=5158 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:46.225056 sshd[5156]: pam_unix(sshd:session): session closed for user core Jul 2 01:53:46.225000 audit[5156]: USER_END pid=5156 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:46.228622 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 01:53:46.229422 systemd[1]: sshd@7-10.200.20.4:22-10.200.16.10:35772.service: Deactivated successfully. Jul 2 01:53:46.226000 audit[5156]: CRED_DISP pid=5156 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:46.272888 kernel: audit: type=1106 audit(1719885226.225:1304): pid=5156 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:46.273017 kernel: audit: type=1104 audit(1719885226.226:1305): pid=5156 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:46.273252 systemd-logind[1435]: Session 10 logged out. Waiting for processes to exit. Jul 2 01:53:46.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.4:22-10.200.16.10:35772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:46.274716 systemd-logind[1435]: Removed session 10. Jul 2 01:53:49.745470 systemd[1]: run-containerd-runc-k8s.io-2138fa7b34eebd4db73c5c430ba820a5f7f8139a4148f9f556cb4829b12aa281-runc.ysic7h.mount: Deactivated successfully. Jul 2 01:53:51.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.4:22-10.200.16.10:55502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:51.304785 systemd[1]: Started sshd@8-10.200.20.4:22-10.200.16.10:55502.service. Jul 2 01:53:51.309682 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:53:51.309769 kernel: audit: type=1130 audit(1719885231.304:1307): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.4:22-10.200.16.10:55502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:51.812000 audit[5189]: USER_ACCT pid=5189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:51.813475 sshd[5189]: Accepted publickey for core from 10.200.16.10 port 55502 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:53:51.835000 audit[5189]: CRED_ACQ pid=5189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:51.836957 sshd[5189]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:53:51.842098 systemd[1]: Started session-11.scope. Jul 2 01:53:51.843486 systemd-logind[1435]: New session 11 of user core. Jul 2 01:53:51.857449 kernel: audit: type=1101 audit(1719885231.812:1308): pid=5189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:51.858686 kernel: audit: type=1103 audit(1719885231.835:1309): pid=5189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:51.873572 kernel: audit: type=1006 audit(1719885231.835:1310): pid=5189 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Jul 2 01:53:51.835000 audit[5189]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6c041f0 a2=3 a3=1 items=0 ppid=1 pid=5189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:51.896933 kernel: audit: type=1300 audit(1719885231.835:1310): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6c041f0 a2=3 a3=1 items=0 ppid=1 pid=5189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:51.835000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:53:51.905230 kernel: audit: type=1327 audit(1719885231.835:1310): proctitle=737368643A20636F7265205B707269765D Jul 2 01:53:51.858000 audit[5189]: USER_START pid=5189 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:51.930317 kernel: audit: type=1105 audit(1719885231.858:1311): pid=5189 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:51.859000 audit[5191]: CRED_ACQ pid=5191 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:51.951516 kernel: audit: type=1103 audit(1719885231.859:1312): pid=5191 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:52.272568 sshd[5189]: pam_unix(sshd:session): session closed for user core Jul 2 01:53:52.272000 audit[5189]: USER_END pid=5189 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:52.272000 audit[5189]: CRED_DISP pid=5189 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:52.299504 systemd[1]: sshd@8-10.200.20.4:22-10.200.16.10:55502.service: Deactivated successfully. Jul 2 01:53:52.300371 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 01:53:52.319637 kernel: audit: type=1106 audit(1719885232.272:1313): pid=5189 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:52.319782 kernel: audit: type=1104 audit(1719885232.272:1314): pid=5189 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:52.320601 systemd-logind[1435]: Session 11 logged out. Waiting for processes to exit. Jul 2 01:53:52.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.4:22-10.200.16.10:55502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:52.321471 systemd-logind[1435]: Removed session 11. Jul 2 01:53:57.348844 systemd[1]: Started sshd@9-10.200.20.4:22-10.200.16.10:55504.service. Jul 2 01:53:57.373597 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:53:57.373691 kernel: audit: type=1130 audit(1719885237.348:1316): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.4:22-10.200.16.10:55504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:57.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.4:22-10.200.16.10:55504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:57.798000 audit[5206]: USER_ACCT pid=5206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:57.800027 sshd[5206]: Accepted publickey for core from 10.200.16.10 port 55504 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:53:57.801846 sshd[5206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:53:57.800000 audit[5206]: CRED_ACQ pid=5206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:57.843346 kernel: audit: type=1101 audit(1719885237.798:1317): pid=5206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:57.843462 kernel: audit: type=1103 audit(1719885237.800:1318): pid=5206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:57.856786 kernel: audit: type=1006 audit(1719885237.800:1319): pid=5206 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Jul 2 01:53:57.800000 audit[5206]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd95b5f20 a2=3 a3=1 items=0 ppid=1 pid=5206 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:57.881993 kernel: audit: type=1300 audit(1719885237.800:1319): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd95b5f20 a2=3 a3=1 items=0 ppid=1 pid=5206 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:57.882122 kernel: audit: type=1327 audit(1719885237.800:1319): proctitle=737368643A20636F7265205B707269765D Jul 2 01:53:57.800000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:53:57.882792 systemd-logind[1435]: New session 12 of user core. Jul 2 01:53:57.884305 systemd[1]: Started session-12.scope. Jul 2 01:53:57.890000 audit[5206]: USER_START pid=5206 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:57.890000 audit[5208]: CRED_ACQ pid=5208 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:57.935893 kernel: audit: type=1105 audit(1719885237.890:1320): pid=5206 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:57.936031 kernel: audit: type=1103 audit(1719885237.890:1321): pid=5208 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:58.221489 sshd[5206]: pam_unix(sshd:session): session closed for user core Jul 2 01:53:58.221000 audit[5206]: USER_END pid=5206 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:58.248147 systemd[1]: sshd@9-10.200.20.4:22-10.200.16.10:55504.service: Deactivated successfully. Jul 2 01:53:58.221000 audit[5206]: CRED_DISP pid=5206 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:58.248966 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 01:53:58.269143 kernel: audit: type=1106 audit(1719885238.221:1322): pid=5206 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:58.269242 kernel: audit: type=1104 audit(1719885238.221:1323): pid=5206 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:58.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.4:22-10.200.16.10:55504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:58.270114 systemd-logind[1435]: Session 12 logged out. Waiting for processes to exit. Jul 2 01:53:58.270936 systemd-logind[1435]: Removed session 12. Jul 2 01:54:03.320828 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:54:03.320970 kernel: audit: type=1130 audit(1719885243.295:1325): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.4:22-10.200.16.10:35836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:03.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.4:22-10.200.16.10:35836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:03.296429 systemd[1]: Started sshd@10-10.200.20.4:22-10.200.16.10:35836.service. Jul 2 01:54:03.745000 audit[5238]: USER_ACCT pid=5238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:03.746781 sshd[5238]: Accepted publickey for core from 10.200.16.10 port 35836 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:03.748531 sshd[5238]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:03.747000 audit[5238]: CRED_ACQ pid=5238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:03.792442 kernel: audit: type=1101 audit(1719885243.745:1326): pid=5238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:03.792583 kernel: audit: type=1103 audit(1719885243.747:1327): pid=5238 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:03.805647 kernel: audit: type=1006 audit(1719885243.747:1328): pid=5238 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Jul 2 01:54:03.747000 audit[5238]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff13bdc20 a2=3 a3=1 items=0 ppid=1 pid=5238 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.808777 systemd[1]: Started session-13.scope. Jul 2 01:54:03.809925 systemd-logind[1435]: New session 13 of user core. Jul 2 01:54:03.827974 kernel: audit: type=1300 audit(1719885243.747:1328): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff13bdc20 a2=3 a3=1 items=0 ppid=1 pid=5238 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:03.747000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:03.837187 kernel: audit: type=1327 audit(1719885243.747:1328): proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:03.815000 audit[5238]: USER_START pid=5238 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:03.862568 kernel: audit: type=1105 audit(1719885243.815:1329): pid=5238 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:03.817000 audit[5240]: CRED_ACQ pid=5240 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:03.885958 kernel: audit: type=1103 audit(1719885243.817:1330): pid=5240 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:04.149802 sshd[5238]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:04.150000 audit[5238]: USER_END pid=5238 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:04.154267 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 01:54:04.155110 systemd[1]: sshd@10-10.200.20.4:22-10.200.16.10:35836.service: Deactivated successfully. Jul 2 01:54:04.152000 audit[5238]: CRED_DISP pid=5238 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:04.175842 systemd-logind[1435]: Session 13 logged out. Waiting for processes to exit. Jul 2 01:54:04.176718 systemd-logind[1435]: Removed session 13. Jul 2 01:54:04.195972 kernel: audit: type=1106 audit(1719885244.150:1331): pid=5238 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:04.196074 kernel: audit: type=1104 audit(1719885244.152:1332): pid=5238 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:04.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.4:22-10.200.16.10:35836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:04.227744 systemd[1]: Started sshd@11-10.200.20.4:22-10.200.16.10:35850.service. Jul 2 01:54:04.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.4:22-10.200.16.10:35850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:04.680000 audit[5250]: USER_ACCT pid=5250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:04.681457 sshd[5250]: Accepted publickey for core from 10.200.16.10 port 35850 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:04.681000 audit[5250]: CRED_ACQ pid=5250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:04.681000 audit[5250]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc9764b0 a2=3 a3=1 items=0 ppid=1 pid=5250 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:04.681000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:04.683087 sshd[5250]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:04.687554 systemd[1]: Started session-14.scope. Jul 2 01:54:04.688108 systemd-logind[1435]: New session 14 of user core. Jul 2 01:54:04.691000 audit[5250]: USER_START pid=5250 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:04.692000 audit[5252]: CRED_ACQ pid=5252 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:05.728449 sshd[5250]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:05.729000 audit[5250]: USER_END pid=5250 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:05.729000 audit[5250]: CRED_DISP pid=5250 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:05.731381 systemd-logind[1435]: Session 14 logged out. Waiting for processes to exit. Jul 2 01:54:05.731626 systemd[1]: sshd@11-10.200.20.4:22-10.200.16.10:35850.service: Deactivated successfully. Jul 2 01:54:05.732388 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 01:54:05.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.4:22-10.200.16.10:35850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:05.733262 systemd-logind[1435]: Removed session 14. Jul 2 01:54:05.802023 systemd[1]: Started sshd@12-10.200.20.4:22-10.200.16.10:35854.service. Jul 2 01:54:05.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.4:22-10.200.16.10:35854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:06.253633 sshd[5260]: Accepted publickey for core from 10.200.16.10 port 35854 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:06.252000 audit[5260]: USER_ACCT pid=5260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:06.255387 sshd[5260]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:06.254000 audit[5260]: CRED_ACQ pid=5260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:06.254000 audit[5260]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd64dff00 a2=3 a3=1 items=0 ppid=1 pid=5260 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:06.254000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:06.259261 systemd-logind[1435]: New session 15 of user core. Jul 2 01:54:06.259693 systemd[1]: Started session-15.scope. Jul 2 01:54:06.263000 audit[5260]: USER_START pid=5260 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:06.264000 audit[5262]: CRED_ACQ pid=5262 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:06.660264 sshd[5260]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:06.660000 audit[5260]: USER_END pid=5260 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:06.660000 audit[5260]: CRED_DISP pid=5260 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:06.663093 systemd-logind[1435]: Session 15 logged out. Waiting for processes to exit. Jul 2 01:54:06.663253 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 01:54:06.664039 systemd[1]: sshd@12-10.200.20.4:22-10.200.16.10:35854.service: Deactivated successfully. Jul 2 01:54:06.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.4:22-10.200.16.10:35854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:06.665287 systemd-logind[1435]: Removed session 15. Jul 2 01:54:09.023275 systemd[1]: run-containerd-runc-k8s.io-51d203fa79ffe8596bb00cd8d734cbc4660338a3fd4989abcc4ab06e94ac0bcd-runc.Lan2Eg.mount: Deactivated successfully. Jul 2 01:54:11.741573 systemd[1]: Started sshd@13-10.200.20.4:22-10.200.16.10:42110.service. Jul 2 01:54:11.766935 kernel: kauditd_printk_skb: 23 callbacks suppressed Jul 2 01:54:11.767046 kernel: audit: type=1130 audit(1719885251.740:1352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.4:22-10.200.16.10:42110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:11.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.4:22-10.200.16.10:42110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:12.180000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:12.180000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:12.224684 kernel: audit: type=1400 audit(1719885252.180:1354): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:12.224907 kernel: audit: type=1400 audit(1719885252.180:1353): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:12.224945 kernel: audit: type=1300 audit(1719885252.180:1353): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a1f4c0 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:54:12.180000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a1f4c0 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:54:12.180000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:12.262093 sshd[5302]: Accepted publickey for core from 10.200.16.10 port 42110 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:12.264183 sshd[5302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:12.274756 kernel: audit: type=1327 audit(1719885252.180:1353): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:12.180000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001a38240 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:54:12.302366 kernel: audit: type=1300 audit(1719885252.180:1354): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001a38240 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:54:12.180000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:12.325839 kernel: audit: type=1327 audit(1719885252.180:1354): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:12.261000 audit[5302]: USER_ACCT pid=5302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:12.347827 kernel: audit: type=1101 audit(1719885252.261:1355): pid=5302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:12.262000 audit[5302]: CRED_ACQ pid=5302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:12.368368 kernel: audit: type=1103 audit(1719885252.262:1356): pid=5302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:12.381499 kernel: audit: type=1006 audit(1719885252.263:1357): pid=5302 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Jul 2 01:54:12.263000 audit[5302]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffbbe8ad0 a2=3 a3=1 items=0 ppid=1 pid=5302 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:12.263000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:12.301000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:12.301000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4013065500 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:54:12.301000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:54:12.301000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:12.301000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4012b07260 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:54:12.301000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:54:12.301000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:12.301000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:12.301000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=400f0347c0 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:54:12.301000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:54:12.301000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4012b07290 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:54:12.301000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:54:12.315000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:12.315000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=400f044100 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:54:12.315000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:54:12.325000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:12.325000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=40130655f0 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:54:12.325000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:54:12.384951 systemd[1]: Started session-16.scope. Jul 2 01:54:12.385252 systemd-logind[1435]: New session 16 of user core. Jul 2 01:54:12.388000 audit[5302]: USER_START pid=5302 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:12.390000 audit[5304]: CRED_ACQ pid=5304 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:12.739293 sshd[5302]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:12.739000 audit[5302]: USER_END pid=5302 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:12.739000 audit[5302]: CRED_DISP pid=5302 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:12.742468 systemd-logind[1435]: Session 16 logged out. Waiting for processes to exit. Jul 2 01:54:12.743688 systemd[1]: session-16.scope: Deactivated successfully. Jul 2 01:54:12.744817 systemd[1]: sshd@13-10.200.20.4:22-10.200.16.10:42110.service: Deactivated successfully. Jul 2 01:54:12.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.4:22-10.200.16.10:42110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:12.745934 systemd-logind[1435]: Removed session 16. Jul 2 01:54:17.055000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:17.061014 kernel: kauditd_printk_skb: 25 callbacks suppressed Jul 2 01:54:17.061133 kernel: audit: type=1400 audit(1719885257.055:1369): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:17.055000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400264f160 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:54:17.111286 kernel: audit: type=1300 audit(1719885257.055:1369): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400264f160 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:54:17.055000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:17.134894 kernel: audit: type=1327 audit(1719885257.055:1369): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:17.057000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:17.155308 kernel: audit: type=1400 audit(1719885257.057:1370): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:17.155432 kernel: audit: type=1300 audit(1719885257.057:1370): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400264f180 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:54:17.057000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400264f180 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:54:17.182827 kernel: audit: type=1327 audit(1719885257.057:1370): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:17.057000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:17.059000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:17.225609 kernel: audit: type=1400 audit(1719885257.059:1371): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:17.059000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002386960 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:54:17.252468 kernel: audit: type=1300 audit(1719885257.059:1371): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002386960 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:54:17.252578 kernel: audit: type=1327 audit(1719885257.059:1371): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:17.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:17.059000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:17.296576 kernel: audit: type=1400 audit(1719885257.059:1372): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:17.059000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002386980 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:54:17.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:17.701000 audit[4723]: AVC avc: denied { watch } for pid=4723 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_12.3852504002/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c501 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c392,c501 tclass=file permissive=0 Jul 2 01:54:17.701000 audit[4723]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400209c660 a2=fc6 a3=0 items=0 ppid=4520 pid=4723 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c501 key=(null) Jul 2 01:54:17.701000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:54:17.819992 systemd[1]: Started sshd@14-10.200.20.4:22-10.200.16.10:42120.service. Jul 2 01:54:17.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.4:22-10.200.16.10:42120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:18.302000 audit[5321]: USER_ACCT pid=5321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:18.303379 sshd[5321]: Accepted publickey for core from 10.200.16.10 port 42120 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:18.303000 audit[5321]: CRED_ACQ pid=5321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:18.303000 audit[5321]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe14e32a0 a2=3 a3=1 items=0 ppid=1 pid=5321 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:18.303000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:18.305081 sshd[5321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:18.309473 systemd[1]: Started session-17.scope. Jul 2 01:54:18.310584 systemd-logind[1435]: New session 17 of user core. Jul 2 01:54:18.314000 audit[5321]: USER_START pid=5321 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:18.315000 audit[5323]: CRED_ACQ pid=5323 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:18.714099 sshd[5321]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:18.714000 audit[5321]: USER_END pid=5321 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:18.714000 audit[5321]: CRED_DISP pid=5321 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:18.717178 systemd-logind[1435]: Session 17 logged out. Waiting for processes to exit. Jul 2 01:54:18.717845 systemd[1]: sshd@14-10.200.20.4:22-10.200.16.10:42120.service: Deactivated successfully. Jul 2 01:54:18.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.4:22-10.200.16.10:42120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:18.718615 systemd[1]: session-17.scope: Deactivated successfully. Jul 2 01:54:18.719866 systemd-logind[1435]: Removed session 17. Jul 2 01:54:18.826000 audit[4819]: AVC avc: denied { watch } for pid=4819 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_12.540488295/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c671,c892 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c671,c892 tclass=file permissive=0 Jul 2 01:54:18.826000 audit[4819]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000550ac0 a2=fc6 a3=0 items=0 ppid=4565 pid=4819 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c671,c892 key=(null) Jul 2 01:54:18.826000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:54:19.738562 systemd[1]: run-containerd-runc-k8s.io-2138fa7b34eebd4db73c5c430ba820a5f7f8139a4148f9f556cb4829b12aa281-runc.8xbbX2.mount: Deactivated successfully. Jul 2 01:54:23.789947 systemd[1]: Started sshd@15-10.200.20.4:22-10.200.16.10:46246.service. Jul 2 01:54:23.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.4:22-10.200.16.10:46246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:23.795652 kernel: kauditd_printk_skb: 19 callbacks suppressed Jul 2 01:54:23.795739 kernel: audit: type=1130 audit(1719885263.789:1384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.4:22-10.200.16.10:46246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:24.243000 audit[5352]: USER_ACCT pid=5352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:24.246275 sshd[5352]: Accepted publickey for core from 10.200.16.10 port 46246 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:24.247166 sshd[5352]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:24.243000 audit[5352]: CRED_ACQ pid=5352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:24.288039 kernel: audit: type=1101 audit(1719885264.243:1385): pid=5352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:24.288232 kernel: audit: type=1103 audit(1719885264.243:1386): pid=5352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:24.292488 systemd[1]: Started session-18.scope. Jul 2 01:54:24.293711 systemd-logind[1435]: New session 18 of user core. Jul 2 01:54:24.301130 kernel: audit: type=1006 audit(1719885264.243:1387): pid=5352 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Jul 2 01:54:24.243000 audit[5352]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc28fc510 a2=3 a3=1 items=0 ppid=1 pid=5352 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.324547 kernel: audit: type=1300 audit(1719885264.243:1387): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc28fc510 a2=3 a3=1 items=0 ppid=1 pid=5352 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:24.324678 kernel: audit: type=1327 audit(1719885264.243:1387): proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:24.243000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:24.300000 audit[5352]: USER_START pid=5352 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:24.355841 kernel: audit: type=1105 audit(1719885264.300:1388): pid=5352 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:24.300000 audit[5354]: CRED_ACQ pid=5354 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:24.375993 kernel: audit: type=1103 audit(1719885264.300:1389): pid=5354 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:24.648624 sshd[5352]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:24.648000 audit[5352]: USER_END pid=5352 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:24.648000 audit[5352]: CRED_DISP pid=5352 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:24.676009 systemd-logind[1435]: Session 18 logged out. Waiting for processes to exit. Jul 2 01:54:24.677449 systemd[1]: sshd@15-10.200.20.4:22-10.200.16.10:46246.service: Deactivated successfully. Jul 2 01:54:24.678247 systemd[1]: session-18.scope: Deactivated successfully. Jul 2 01:54:24.679637 systemd-logind[1435]: Removed session 18. Jul 2 01:54:24.694471 kernel: audit: type=1106 audit(1719885264.648:1390): pid=5352 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:24.694629 kernel: audit: type=1104 audit(1719885264.648:1391): pid=5352 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:24.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.4:22-10.200.16.10:46246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:24.723469 systemd[1]: Started sshd@16-10.200.20.4:22-10.200.16.10:46262.service. Jul 2 01:54:24.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.4:22-10.200.16.10:46262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:25.170000 audit[5363]: USER_ACCT pid=5363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:25.171373 sshd[5363]: Accepted publickey for core from 10.200.16.10 port 46262 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:25.171000 audit[5363]: CRED_ACQ pid=5363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:25.171000 audit[5363]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff54a5850 a2=3 a3=1 items=0 ppid=1 pid=5363 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:25.171000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:25.173036 sshd[5363]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:25.177340 systemd[1]: Started session-19.scope. Jul 2 01:54:25.177990 systemd-logind[1435]: New session 19 of user core. Jul 2 01:54:25.181000 audit[5363]: USER_START pid=5363 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:25.182000 audit[5365]: CRED_ACQ pid=5365 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:25.649761 sshd[5363]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:25.650000 audit[5363]: USER_END pid=5363 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:25.650000 audit[5363]: CRED_DISP pid=5363 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:25.652528 systemd[1]: sshd@16-10.200.20.4:22-10.200.16.10:46262.service: Deactivated successfully. Jul 2 01:54:25.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.4:22-10.200.16.10:46262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:25.653338 systemd[1]: session-19.scope: Deactivated successfully. Jul 2 01:54:25.653956 systemd-logind[1435]: Session 19 logged out. Waiting for processes to exit. Jul 2 01:54:25.655009 systemd-logind[1435]: Removed session 19. Jul 2 01:54:25.729539 systemd[1]: Started sshd@17-10.200.20.4:22-10.200.16.10:46266.service. Jul 2 01:54:25.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.4:22-10.200.16.10:46266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:26.220000 audit[5373]: USER_ACCT pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:26.221914 sshd[5373]: Accepted publickey for core from 10.200.16.10 port 46266 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:26.222000 audit[5373]: CRED_ACQ pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:26.222000 audit[5373]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe866f0a0 a2=3 a3=1 items=0 ppid=1 pid=5373 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:26.222000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:26.223608 sshd[5373]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:26.227447 systemd-logind[1435]: New session 20 of user core. Jul 2 01:54:26.227925 systemd[1]: Started session-20.scope. Jul 2 01:54:26.231000 audit[5373]: USER_START pid=5373 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:26.233000 audit[5375]: CRED_ACQ pid=5375 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:27.245000 audit[5385]: NETFILTER_CFG table=filter:130 family=2 entries=20 op=nft_register_rule pid=5385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:27.245000 audit[5385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffffb839fe0 a2=0 a3=1 items=0 ppid=2755 pid=5385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:27.245000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:27.246000 audit[5385]: NETFILTER_CFG table=nat:131 family=2 entries=22 op=nft_register_rule pid=5385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:27.246000 audit[5385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffffb839fe0 a2=0 a3=1 items=0 ppid=2755 pid=5385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:27.246000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:27.268000 audit[5387]: NETFILTER_CFG table=filter:132 family=2 entries=32 op=nft_register_rule pid=5387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:27.268000 audit[5387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe5344bc0 a2=0 a3=1 items=0 ppid=2755 pid=5387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:27.268000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:27.269000 audit[5387]: NETFILTER_CFG table=nat:133 family=2 entries=22 op=nft_register_rule pid=5387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:27.269000 audit[5387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe5344bc0 a2=0 a3=1 items=0 ppid=2755 pid=5387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:27.269000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:27.326962 sshd[5373]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:27.327000 audit[5373]: USER_END pid=5373 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:27.327000 audit[5373]: CRED_DISP pid=5373 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:27.330152 systemd[1]: sshd@17-10.200.20.4:22-10.200.16.10:46266.service: Deactivated successfully. Jul 2 01:54:27.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.4:22-10.200.16.10:46266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:27.330965 systemd[1]: session-20.scope: Deactivated successfully. Jul 2 01:54:27.331560 systemd-logind[1435]: Session 20 logged out. Waiting for processes to exit. Jul 2 01:54:27.332524 systemd-logind[1435]: Removed session 20. Jul 2 01:54:27.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.4:22-10.200.16.10:46282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:27.406329 systemd[1]: Started sshd@18-10.200.20.4:22-10.200.16.10:46282.service. Jul 2 01:54:27.889980 sshd[5395]: Accepted publickey for core from 10.200.16.10 port 46282 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:27.889000 audit[5395]: USER_ACCT pid=5395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:27.890000 audit[5395]: CRED_ACQ pid=5395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:27.890000 audit[5395]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeac52fd0 a2=3 a3=1 items=0 ppid=1 pid=5395 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:27.890000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:27.891868 sshd[5395]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:27.896743 systemd[1]: Started session-21.scope. Jul 2 01:54:27.897328 systemd-logind[1435]: New session 21 of user core. Jul 2 01:54:27.902000 audit[5395]: USER_START pid=5395 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:27.903000 audit[5397]: CRED_ACQ pid=5397 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:28.485087 sshd[5395]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:28.485000 audit[5395]: USER_END pid=5395 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:28.485000 audit[5395]: CRED_DISP pid=5395 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:28.487680 systemd-logind[1435]: Session 21 logged out. Waiting for processes to exit. Jul 2 01:54:28.487883 systemd[1]: sshd@18-10.200.20.4:22-10.200.16.10:46282.service: Deactivated successfully. Jul 2 01:54:28.488625 systemd[1]: session-21.scope: Deactivated successfully. Jul 2 01:54:28.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.4:22-10.200.16.10:46282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:28.489529 systemd-logind[1435]: Removed session 21. Jul 2 01:54:28.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.4:22-10.200.16.10:35680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:28.563918 systemd[1]: Started sshd@19-10.200.20.4:22-10.200.16.10:35680.service. Jul 2 01:54:29.047000 audit[5405]: USER_ACCT pid=5405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:29.048905 sshd[5405]: Accepted publickey for core from 10.200.16.10 port 35680 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:29.050690 sshd[5405]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:29.052987 kernel: kauditd_printk_skb: 47 callbacks suppressed Jul 2 01:54:29.053078 kernel: audit: type=1101 audit(1719885269.047:1425): pid=5405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:29.079138 kernel: audit: type=1103 audit(1719885269.047:1426): pid=5405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:29.047000 audit[5405]: CRED_ACQ pid=5405 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:29.113256 kernel: audit: type=1006 audit(1719885269.047:1427): pid=5405 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Jul 2 01:54:29.113380 kernel: audit: type=1300 audit(1719885269.047:1427): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffec7ca8a0 a2=3 a3=1 items=0 ppid=1 pid=5405 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:29.047000 audit[5405]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffec7ca8a0 a2=3 a3=1 items=0 ppid=1 pid=5405 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:29.138566 systemd-logind[1435]: New session 22 of user core. Jul 2 01:54:29.138997 systemd[1]: Started session-22.scope. Jul 2 01:54:29.047000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:29.146505 kernel: audit: type=1327 audit(1719885269.047:1427): proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:29.149000 audit[5405]: USER_START pid=5405 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:29.174835 kernel: audit: type=1105 audit(1719885269.149:1428): pid=5405 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:29.174000 audit[5407]: CRED_ACQ pid=5407 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:29.195833 kernel: audit: type=1103 audit(1719885269.174:1429): pid=5407 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:29.517029 sshd[5405]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:29.517000 audit[5405]: USER_END pid=5405 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:29.520644 systemd-logind[1435]: Session 22 logged out. Waiting for processes to exit. Jul 2 01:54:29.521986 systemd[1]: session-22.scope: Deactivated successfully. Jul 2 01:54:29.523892 systemd-logind[1435]: Removed session 22. Jul 2 01:54:29.524540 systemd[1]: sshd@19-10.200.20.4:22-10.200.16.10:35680.service: Deactivated successfully. Jul 2 01:54:29.518000 audit[5405]: CRED_DISP pid=5405 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:29.562423 kernel: audit: type=1106 audit(1719885269.517:1430): pid=5405 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:29.562518 kernel: audit: type=1104 audit(1719885269.518:1431): pid=5405 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:29.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.4:22-10.200.16.10:35680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:29.582920 kernel: audit: type=1131 audit(1719885269.523:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.4:22-10.200.16.10:35680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:34.590837 systemd[1]: Started sshd@20-10.200.20.4:22-10.200.16.10:35684.service. Jul 2 01:54:34.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.4:22-10.200.16.10:35684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:34.611842 kernel: audit: type=1130 audit(1719885274.590:1433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.4:22-10.200.16.10:35684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:34.632000 audit[5422]: NETFILTER_CFG table=filter:134 family=2 entries=20 op=nft_register_rule pid=5422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:34.632000 audit[5422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd0f5fec0 a2=0 a3=1 items=0 ppid=2755 pid=5422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:34.669076 kernel: audit: type=1325 audit(1719885274.632:1434): table=filter:134 family=2 entries=20 op=nft_register_rule pid=5422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:34.669191 kernel: audit: type=1300 audit(1719885274.632:1434): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd0f5fec0 a2=0 a3=1 items=0 ppid=2755 pid=5422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:34.632000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:34.681447 kernel: audit: type=1327 audit(1719885274.632:1434): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:34.634000 audit[5422]: NETFILTER_CFG table=nat:135 family=2 entries=106 op=nft_register_chain pid=5422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:34.634000 audit[5422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd0f5fec0 a2=0 a3=1 items=0 ppid=2755 pid=5422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:34.720264 kernel: audit: type=1325 audit(1719885274.634:1435): table=nat:135 family=2 entries=106 op=nft_register_chain pid=5422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:34.720384 kernel: audit: type=1300 audit(1719885274.634:1435): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd0f5fec0 a2=0 a3=1 items=0 ppid=2755 pid=5422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:34.720420 kernel: audit: type=1327 audit(1719885274.634:1435): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:34.634000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:35.051000 audit[5419]: USER_ACCT pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:35.052832 sshd[5419]: Accepted publickey for core from 10.200.16.10 port 35684 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:35.054965 sshd[5419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:35.053000 audit[5419]: CRED_ACQ pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:35.096189 kernel: audit: type=1101 audit(1719885275.051:1436): pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:35.096320 kernel: audit: type=1103 audit(1719885275.053:1437): pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:35.096357 kernel: audit: type=1006 audit(1719885275.053:1438): pid=5419 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Jul 2 01:54:35.053000 audit[5419]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4add1a0 a2=3 a3=1 items=0 ppid=1 pid=5419 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:35.053000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:35.112681 systemd-logind[1435]: New session 23 of user core. Jul 2 01:54:35.113168 systemd[1]: Started session-23.scope. Jul 2 01:54:35.116000 audit[5419]: USER_START pid=5419 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:35.118000 audit[5424]: CRED_ACQ pid=5424 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:35.445135 sshd[5419]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:35.446000 audit[5419]: USER_END pid=5419 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:35.446000 audit[5419]: CRED_DISP pid=5419 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:35.448389 systemd-logind[1435]: Session 23 logged out. Waiting for processes to exit. Jul 2 01:54:35.448564 systemd[1]: sshd@20-10.200.20.4:22-10.200.16.10:35684.service: Deactivated successfully. Jul 2 01:54:35.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.4:22-10.200.16.10:35684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:35.449364 systemd[1]: session-23.scope: Deactivated successfully. Jul 2 01:54:35.450071 systemd-logind[1435]: Removed session 23. Jul 2 01:54:39.025206 systemd[1]: run-containerd-runc-k8s.io-51d203fa79ffe8596bb00cd8d734cbc4660338a3fd4989abcc4ab06e94ac0bcd-runc.pke7bn.mount: Deactivated successfully. Jul 2 01:54:40.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.4:22-10.200.16.10:44802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:40.525929 systemd[1]: Started sshd@21-10.200.20.4:22-10.200.16.10:44802.service. Jul 2 01:54:40.530881 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 2 01:54:40.530984 kernel: audit: type=1130 audit(1719885280.525:1444): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.4:22-10.200.16.10:44802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:41.015000 audit[5467]: USER_ACCT pid=5467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:41.016369 sshd[5467]: Accepted publickey for core from 10.200.16.10 port 44802 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:41.018214 sshd[5467]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:41.017000 audit[5467]: CRED_ACQ pid=5467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:41.061257 kernel: audit: type=1101 audit(1719885281.015:1445): pid=5467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:41.061446 kernel: audit: type=1103 audit(1719885281.017:1446): pid=5467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:41.074751 kernel: audit: type=1006 audit(1719885281.017:1447): pid=5467 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Jul 2 01:54:41.017000 audit[5467]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd03c3060 a2=3 a3=1 items=0 ppid=1 pid=5467 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:41.098024 kernel: audit: type=1300 audit(1719885281.017:1447): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd03c3060 a2=3 a3=1 items=0 ppid=1 pid=5467 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:41.017000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:41.101341 systemd[1]: Started session-24.scope. Jul 2 01:54:41.106077 kernel: audit: type=1327 audit(1719885281.017:1447): proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:41.106150 systemd-logind[1435]: New session 24 of user core. Jul 2 01:54:41.111000 audit[5467]: USER_START pid=5467 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:41.137000 audit[5472]: CRED_ACQ pid=5472 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:41.158746 kernel: audit: type=1105 audit(1719885281.111:1448): pid=5467 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:41.158886 kernel: audit: type=1103 audit(1719885281.137:1449): pid=5472 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:41.487562 sshd[5467]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:41.487000 audit[5467]: USER_END pid=5467 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:41.491484 systemd-logind[1435]: Session 24 logged out. Waiting for processes to exit. Jul 2 01:54:41.492646 systemd[1]: session-24.scope: Deactivated successfully. Jul 2 01:54:41.493923 systemd-logind[1435]: Removed session 24. Jul 2 01:54:41.494532 systemd[1]: sshd@21-10.200.20.4:22-10.200.16.10:44802.service: Deactivated successfully. Jul 2 01:54:41.489000 audit[5467]: CRED_DISP pid=5467 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:41.534289 kernel: audit: type=1106 audit(1719885281.487:1450): pid=5467 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:41.534388 kernel: audit: type=1104 audit(1719885281.489:1451): pid=5467 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:41.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.4:22-10.200.16.10:44802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:46.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.4:22-10.200.16.10:44818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:46.561779 systemd[1]: Started sshd@22-10.200.20.4:22-10.200.16.10:44818.service. Jul 2 01:54:46.566874 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:54:46.567050 kernel: audit: type=1130 audit(1719885286.561:1453): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.4:22-10.200.16.10:44818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:47.012000 audit[5481]: USER_ACCT pid=5481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:47.013830 sshd[5481]: Accepted publickey for core from 10.200.16.10 port 44818 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:47.037832 kernel: audit: type=1101 audit(1719885287.012:1454): pid=5481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:47.037927 kernel: audit: type=1103 audit(1719885287.036:1455): pid=5481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:47.036000 audit[5481]: CRED_ACQ pid=5481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:47.038130 sshd[5481]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:47.064851 systemd[1]: Started session-25.scope. Jul 2 01:54:47.065866 systemd-logind[1435]: New session 25 of user core. Jul 2 01:54:47.075860 kernel: audit: type=1006 audit(1719885287.036:1456): pid=5481 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Jul 2 01:54:47.036000 audit[5481]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc4c40c0 a2=3 a3=1 items=0 ppid=1 pid=5481 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:47.098711 kernel: audit: type=1300 audit(1719885287.036:1456): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc4c40c0 a2=3 a3=1 items=0 ppid=1 pid=5481 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:47.036000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:47.106734 kernel: audit: type=1327 audit(1719885287.036:1456): proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:47.073000 audit[5481]: USER_START pid=5481 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:47.131070 kernel: audit: type=1105 audit(1719885287.073:1457): pid=5481 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:47.074000 audit[5483]: CRED_ACQ pid=5483 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:47.151193 kernel: audit: type=1103 audit(1719885287.074:1458): pid=5483 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:47.429729 sshd[5481]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:47.429000 audit[5481]: USER_END pid=5481 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:47.433702 systemd[1]: session-25.scope: Deactivated successfully. Jul 2 01:54:47.434582 systemd[1]: sshd@22-10.200.20.4:22-10.200.16.10:44818.service: Deactivated successfully. Jul 2 01:54:47.431000 audit[5481]: CRED_DISP pid=5481 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:47.474958 kernel: audit: type=1106 audit(1719885287.429:1459): pid=5481 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:47.475093 kernel: audit: type=1104 audit(1719885287.431:1460): pid=5481 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:47.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.4:22-10.200.16.10:44818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:47.475266 systemd-logind[1435]: Session 25 logged out. Waiting for processes to exit. Jul 2 01:54:47.476067 systemd-logind[1435]: Removed session 25. Jul 2 01:54:52.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.4:22-10.200.16.10:58902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:52.503178 systemd[1]: Started sshd@23-10.200.20.4:22-10.200.16.10:58902.service. Jul 2 01:54:52.508003 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:54:52.508064 kernel: audit: type=1130 audit(1719885292.502:1462): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.4:22-10.200.16.10:58902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:52.952000 audit[5517]: USER_ACCT pid=5517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:52.953967 sshd[5517]: Accepted publickey for core from 10.200.16.10 port 58902 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:52.975000 audit[5517]: CRED_ACQ pid=5517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:52.977270 sshd[5517]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:52.997275 kernel: audit: type=1101 audit(1719885292.952:1463): pid=5517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:52.997372 kernel: audit: type=1103 audit(1719885292.975:1464): pid=5517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:52.997537 kernel: audit: type=1006 audit(1719885292.976:1465): pid=5517 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Jul 2 01:54:52.976000 audit[5517]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb08eb70 a2=3 a3=1 items=0 ppid=1 pid=5517 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:53.013637 systemd[1]: Started session-26.scope. Jul 2 01:54:53.014708 systemd-logind[1435]: New session 26 of user core. Jul 2 01:54:53.032610 kernel: audit: type=1300 audit(1719885292.976:1465): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb08eb70 a2=3 a3=1 items=0 ppid=1 pid=5517 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:52.976000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:53.039950 kernel: audit: type=1327 audit(1719885292.976:1465): proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:53.040026 kernel: audit: type=1105 audit(1719885293.020:1466): pid=5517 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:53.020000 audit[5517]: USER_START pid=5517 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:53.021000 audit[5519]: CRED_ACQ pid=5519 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:53.084356 kernel: audit: type=1103 audit(1719885293.021:1467): pid=5519 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:53.374070 sshd[5517]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:53.374000 audit[5517]: USER_END pid=5517 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:53.377416 systemd[1]: session-26.scope: Deactivated successfully. Jul 2 01:54:53.378277 systemd[1]: sshd@23-10.200.20.4:22-10.200.16.10:58902.service: Deactivated successfully. Jul 2 01:54:53.375000 audit[5517]: CRED_DISP pid=5517 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:53.400357 systemd-logind[1435]: Session 26 logged out. Waiting for processes to exit. Jul 2 01:54:53.401272 systemd-logind[1435]: Removed session 26. Jul 2 01:54:53.419394 kernel: audit: type=1106 audit(1719885293.374:1468): pid=5517 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:53.419530 kernel: audit: type=1104 audit(1719885293.375:1469): pid=5517 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:53.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.4:22-10.200.16.10:58902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:58.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.4:22-10.200.16.10:33404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:58.449106 systemd[1]: Started sshd@24-10.200.20.4:22-10.200.16.10:33404.service. Jul 2 01:54:58.454317 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:54:58.454429 kernel: audit: type=1130 audit(1719885298.448:1471): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.4:22-10.200.16.10:33404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:58.904000 audit[5532]: USER_ACCT pid=5532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:58.905899 sshd[5532]: Accepted publickey for core from 10.200.16.10 port 33404 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:58.929834 kernel: audit: type=1101 audit(1719885298.904:1472): pid=5532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:58.930471 sshd[5532]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:58.929000 audit[5532]: CRED_ACQ pid=5532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:58.966461 kernel: audit: type=1103 audit(1719885298.929:1473): pid=5532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:58.966565 kernel: audit: type=1006 audit(1719885298.929:1474): pid=5532 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Jul 2 01:54:58.929000 audit[5532]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb56cc20 a2=3 a3=1 items=0 ppid=1 pid=5532 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:58.991412 kernel: audit: type=1300 audit(1719885298.929:1474): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb56cc20 a2=3 a3=1 items=0 ppid=1 pid=5532 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:58.969412 systemd[1]: Started session-27.scope. Jul 2 01:54:58.991035 systemd-logind[1435]: New session 27 of user core. Jul 2 01:54:58.929000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:58.999015 kernel: audit: type=1327 audit(1719885298.929:1474): proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:59.002000 audit[5532]: USER_START pid=5532 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:59.026000 audit[5534]: CRED_ACQ pid=5534 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:59.047276 kernel: audit: type=1105 audit(1719885299.002:1475): pid=5532 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:59.047391 kernel: audit: type=1103 audit(1719885299.026:1476): pid=5534 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:59.356975 sshd[5532]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:59.357000 audit[5532]: USER_END pid=5532 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:59.382873 systemd[1]: sshd@24-10.200.20.4:22-10.200.16.10:33404.service: Deactivated successfully. Jul 2 01:54:59.383683 systemd[1]: session-27.scope: Deactivated successfully. Jul 2 01:54:59.384575 systemd-logind[1435]: Session 27 logged out. Waiting for processes to exit. Jul 2 01:54:59.358000 audit[5532]: CRED_DISP pid=5532 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:59.404893 kernel: audit: type=1106 audit(1719885299.357:1477): pid=5532 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:59.404997 kernel: audit: type=1104 audit(1719885299.358:1478): pid=5532 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:59.385360 systemd-logind[1435]: Removed session 27. Jul 2 01:54:59.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.4:22-10.200.16.10:33404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:55:02.470311 systemd[1]: run-containerd-runc-k8s.io-2138fa7b34eebd4db73c5c430ba820a5f7f8139a4148f9f556cb4829b12aa281-runc.D6KM1J.mount: Deactivated successfully. Jul 2 01:55:04.464741 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:55:04.464904 kernel: audit: type=1130 audit(1719885304.438:1480): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.4:22-10.200.16.10:33412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:55:04.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.4:22-10.200.16.10:33412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:55:04.438766 systemd[1]: Started sshd@25-10.200.20.4:22-10.200.16.10:33412.service. Jul 2 01:55:04.921000 audit[5574]: USER_ACCT pid=5574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:04.922431 sshd[5574]: Accepted publickey for core from 10.200.16.10 port 33412 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:55:04.924321 sshd[5574]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:55:04.923000 audit[5574]: CRED_ACQ pid=5574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:04.967080 kernel: audit: type=1101 audit(1719885304.921:1481): pid=5574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:04.967202 kernel: audit: type=1103 audit(1719885304.923:1482): pid=5574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:04.981224 kernel: audit: type=1006 audit(1719885304.923:1483): pid=5574 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Jul 2 01:55:04.923000 audit[5574]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdf78ed40 a2=3 a3=1 items=0 ppid=1 pid=5574 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:05.004928 kernel: audit: type=1300 audit(1719885304.923:1483): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdf78ed40 a2=3 a3=1 items=0 ppid=1 pid=5574 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:04.923000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:55:05.013667 kernel: audit: type=1327 audit(1719885304.923:1483): proctitle=737368643A20636F7265205B707269765D Jul 2 01:55:05.015243 systemd[1]: Started session-28.scope. Jul 2 01:55:05.015584 systemd-logind[1435]: New session 28 of user core. Jul 2 01:55:05.020000 audit[5574]: USER_START pid=5574 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:05.047439 kernel: audit: type=1105 audit(1719885305.020:1484): pid=5574 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:05.047580 kernel: audit: type=1103 audit(1719885305.046:1485): pid=5576 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:05.046000 audit[5576]: CRED_ACQ pid=5576 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:05.395698 sshd[5574]: pam_unix(sshd:session): session closed for user core Jul 2 01:55:05.396000 audit[5574]: USER_END pid=5574 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:05.401000 audit[5574]: CRED_DISP pid=5574 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:05.423391 systemd[1]: sshd@25-10.200.20.4:22-10.200.16.10:33412.service: Deactivated successfully. Jul 2 01:55:05.424425 systemd[1]: session-28.scope: Deactivated successfully. Jul 2 01:55:05.443747 kernel: audit: type=1106 audit(1719885305.396:1486): pid=5574 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:05.443890 kernel: audit: type=1104 audit(1719885305.401:1487): pid=5574 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:05.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.4:22-10.200.16.10:33412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:55:05.444320 systemd-logind[1435]: Session 28 logged out. Waiting for processes to exit. Jul 2 01:55:05.445165 systemd-logind[1435]: Removed session 28. Jul 2 01:55:09.027264 systemd[1]: run-containerd-runc-k8s.io-51d203fa79ffe8596bb00cd8d734cbc4660338a3fd4989abcc4ab06e94ac0bcd-runc.kRX5fq.mount: Deactivated successfully. Jul 2 01:55:12.181000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:12.187078 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:55:12.187193 kernel: audit: type=1400 audit(1719885312.181:1489): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:12.181000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002944140 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:55:12.235464 kernel: audit: type=1300 audit(1719885312.181:1489): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002944140 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:55:12.235603 kernel: audit: type=1327 audit(1719885312.181:1489): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:12.181000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:12.182000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:12.279799 kernel: audit: type=1400 audit(1719885312.182:1490): avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:12.279973 kernel: audit: type=1300 audit(1719885312.182:1490): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001ed2960 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:55:12.182000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001ed2960 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:55:12.182000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:12.333297 kernel: audit: type=1327 audit(1719885312.182:1490): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:12.302000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:12.354999 kernel: audit: type=1400 audit(1719885312.302:1491): avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:12.355127 kernel: audit: type=1300 audit(1719885312.302:1491): arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40089538f0 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:55:12.302000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40089538f0 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:55:12.302000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:55:12.405438 kernel: audit: type=1327 audit(1719885312.302:1491): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:55:12.302000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:12.426758 kernel: audit: type=1400 audit(1719885312.302:1492): avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:12.302000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40048acb70 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:55:12.302000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:55:12.302000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:12.302000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40066fe700 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:55:12.302000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:55:12.302000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:12.302000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40082fce70 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:55:12.302000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:55:12.315000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:12.315000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40066fe740 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:55:12.315000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:55:12.325000 audit[2457]: AVC avc: denied { watch } for pid=2457 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:12.325000 audit[2457]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40048aced0 a2=fc6 a3=0 items=0 ppid=2321 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c463 key=(null) Jul 2 01:55:12.325000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Jul 2 01:55:17.056000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:17.056000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400284bec0 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:55:17.056000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:17.058000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:17.058000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002944300 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:55:17.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:17.059000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:17.059000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029980e0 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:55:17.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:17.059000 audit[2434]: AVC avc: denied { watch } for pid=2434 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:17.059000 audit[2434]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002944320 a2=fc6 a3=0 items=0 ppid=2277 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:55:17.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:17.701000 audit[4723]: AVC avc: denied { watch } for pid=4723 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_12.3852504002/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c501 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c392,c501 tclass=file permissive=0 Jul 2 01:55:17.707155 kernel: kauditd_printk_skb: 26 callbacks suppressed Jul 2 01:55:17.707237 kernel: audit: type=1400 audit(1719885317.701:1501): avc: denied { watch } for pid=4723 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_12.3852504002/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c501 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c392,c501 tclass=file permissive=0 Jul 2 01:55:17.701000 audit[4723]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400204a080 a2=fc6 a3=0 items=0 ppid=4520 pid=4723 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c501 key=(null) Jul 2 01:55:17.759964 kernel: audit: type=1300 audit(1719885317.701:1501): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400204a080 a2=fc6 a3=0 items=0 ppid=4520 pid=4723 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c501 key=(null) Jul 2 01:55:17.760092 kernel: audit: type=1327 audit(1719885317.701:1501): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:55:17.701000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:55:18.826000 audit[4819]: AVC avc: denied { watch } for pid=4819 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_12.540488295/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c671,c892 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c671,c892 tclass=file permissive=0 Jul 2 01:55:18.826000 audit[4819]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000c9e000 a2=fc6 a3=0 items=0 ppid=4565 pid=4819 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c671,c892 key=(null) Jul 2 01:55:18.880403 kernel: audit: type=1400 audit(1719885318.826:1502): avc: denied { watch } for pid=4819 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_12.540488295/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c671,c892 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c671,c892 tclass=file permissive=0 Jul 2 01:55:18.880570 kernel: audit: type=1300 audit(1719885318.826:1502): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000c9e000 a2=fc6 a3=0 items=0 ppid=4565 pid=4819 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c671,c892 key=(null) Jul 2 01:55:18.826000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:55:18.903721 kernel: audit: type=1327 audit(1719885318.826:1502): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:55:19.744785 systemd[1]: run-containerd-runc-k8s.io-2138fa7b34eebd4db73c5c430ba820a5f7f8139a4148f9f556cb4829b12aa281-runc.RHg5ml.mount: Deactivated successfully. Jul 2 01:55:19.839257 kubelet[2577]: I0702 01:55:19.839219 2577 status_manager.go:853] "Failed to get status for pod" podUID="3d1954c9b8bafe1eb6795fb6a24b2857" pod="kube-system/kube-apiserver-ci-3510.3.5-a-6c47a6a388" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.4:38232->10.200.20.23:2379: read: connection timed out" Jul 2 01:55:20.089674 systemd[1]: cri-containerd-034c789b2cb40fed6d48767b8cf7a7daabb61729dad6bb3dcd06ce84400d4cb6.scope: Deactivated successfully. Jul 2 01:55:20.090019 systemd[1]: cri-containerd-034c789b2cb40fed6d48767b8cf7a7daabb61729dad6bb3dcd06ce84400d4cb6.scope: Consumed 5.405s CPU time. Jul 2 01:55:20.089000 audit: BPF prog-id=115 op=UNLOAD Jul 2 01:55:20.097000 audit: BPF prog-id=118 op=UNLOAD Jul 2 01:55:20.105247 kernel: audit: type=1334 audit(1719885320.089:1503): prog-id=115 op=UNLOAD Jul 2 01:55:20.105387 kernel: audit: type=1334 audit(1719885320.097:1504): prog-id=118 op=UNLOAD Jul 2 01:55:20.119525 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-034c789b2cb40fed6d48767b8cf7a7daabb61729dad6bb3dcd06ce84400d4cb6-rootfs.mount: Deactivated successfully. Jul 2 01:55:20.120777 env[1468]: time="2024-07-02T01:55:20.120729553Z" level=info msg="shim disconnected" id=034c789b2cb40fed6d48767b8cf7a7daabb61729dad6bb3dcd06ce84400d4cb6 Jul 2 01:55:20.121091 env[1468]: time="2024-07-02T01:55:20.120781313Z" level=warning msg="cleaning up after shim disconnected" id=034c789b2cb40fed6d48767b8cf7a7daabb61729dad6bb3dcd06ce84400d4cb6 namespace=k8s.io Jul 2 01:55:20.121091 env[1468]: time="2024-07-02T01:55:20.120792594Z" level=info msg="cleaning up dead shim" Jul 2 01:55:20.128901 env[1468]: time="2024-07-02T01:55:20.128854343Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:55:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5657 runtime=io.containerd.runc.v2\n" Jul 2 01:55:20.181510 kubelet[2577]: E0702 01:55:20.181398 2577 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-6c47a6a388?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 01:55:20.416593 kubelet[2577]: E0702 01:55:20.415786 2577 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.4:38324->10.200.20.23:2379: read: connection timed out" Jul 2 01:55:20.420532 systemd[1]: cri-containerd-b0b79e45ce51dc68be46da64a0686025d8a71b7517b4482e6ca033f3660d8e53.scope: Deactivated successfully. Jul 2 01:55:20.420888 systemd[1]: cri-containerd-b0b79e45ce51dc68be46da64a0686025d8a71b7517b4482e6ca033f3660d8e53.scope: Consumed 1.802s CPU time. Jul 2 01:55:20.423000 audit: BPF prog-id=74 op=UNLOAD Jul 2 01:55:20.423000 audit: BPF prog-id=91 op=UNLOAD Jul 2 01:55:20.438343 kernel: audit: type=1334 audit(1719885320.423:1505): prog-id=74 op=UNLOAD Jul 2 01:55:20.438472 kernel: audit: type=1334 audit(1719885320.423:1506): prog-id=91 op=UNLOAD Jul 2 01:55:20.448656 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b0b79e45ce51dc68be46da64a0686025d8a71b7517b4482e6ca033f3660d8e53-rootfs.mount: Deactivated successfully. Jul 2 01:55:20.449229 env[1468]: time="2024-07-02T01:55:20.449182859Z" level=info msg="shim disconnected" id=b0b79e45ce51dc68be46da64a0686025d8a71b7517b4482e6ca033f3660d8e53 Jul 2 01:55:20.449622 env[1468]: time="2024-07-02T01:55:20.449597022Z" level=warning msg="cleaning up after shim disconnected" id=b0b79e45ce51dc68be46da64a0686025d8a71b7517b4482e6ca033f3660d8e53 namespace=k8s.io Jul 2 01:55:20.449706 env[1468]: time="2024-07-02T01:55:20.449692103Z" level=info msg="cleaning up dead shim" Jul 2 01:55:20.459166 env[1468]: time="2024-07-02T01:55:20.459127424Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:55:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5684 runtime=io.containerd.runc.v2\n" Jul 2 01:55:20.503597 kubelet[2577]: I0702 01:55:20.503574 2577 scope.go:117] "RemoveContainer" containerID="034c789b2cb40fed6d48767b8cf7a7daabb61729dad6bb3dcd06ce84400d4cb6" Jul 2 01:55:20.506568 env[1468]: time="2024-07-02T01:55:20.506528232Z" level=info msg="CreateContainer within sandbox \"09e2e4c8b302d293b6d813ed9b5f4010454229ab9639282a1a1943c6685ef334\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Jul 2 01:55:20.508094 kubelet[2577]: I0702 01:55:20.508075 2577 scope.go:117] "RemoveContainer" containerID="b0b79e45ce51dc68be46da64a0686025d8a71b7517b4482e6ca033f3660d8e53" Jul 2 01:55:20.510667 env[1468]: time="2024-07-02T01:55:20.510631427Z" level=info msg="CreateContainer within sandbox \"bf689bd46bc4a0da53813544eb91de35b727de218dd0e8c940c0273945e237d3\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Jul 2 01:55:20.552006 env[1468]: time="2024-07-02T01:55:20.551951583Z" level=info msg="CreateContainer within sandbox \"09e2e4c8b302d293b6d813ed9b5f4010454229ab9639282a1a1943c6685ef334\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"4e69ab5b54a71bd4250c1b6c4acc3712b9fcdd3e85c39956cf5044d614ef703f\"" Jul 2 01:55:20.552632 env[1468]: time="2024-07-02T01:55:20.552609989Z" level=info msg="StartContainer for \"4e69ab5b54a71bd4250c1b6c4acc3712b9fcdd3e85c39956cf5044d614ef703f\"" Jul 2 01:55:20.558221 env[1468]: time="2024-07-02T01:55:20.558165996Z" level=info msg="CreateContainer within sandbox \"bf689bd46bc4a0da53813544eb91de35b727de218dd0e8c940c0273945e237d3\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"81e8d47ccf9992a489f792bca39bb3384bb09234f26368be94ef370fa92109e4\"" Jul 2 01:55:20.558986 env[1468]: time="2024-07-02T01:55:20.558961323Z" level=info msg="StartContainer for \"81e8d47ccf9992a489f792bca39bb3384bb09234f26368be94ef370fa92109e4\"" Jul 2 01:55:20.570894 systemd[1]: Started cri-containerd-4e69ab5b54a71bd4250c1b6c4acc3712b9fcdd3e85c39956cf5044d614ef703f.scope. Jul 2 01:55:20.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.587000 audit: BPF prog-id=194 op=LOAD Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { bpf } for pid=5710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000151b38 a2=10 a3=0 items=0 ppid=2658 pid=5710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:20.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465363961623562353461373162643432353063316236633461636333 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { perfmon } for pid=5710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001515a0 a2=3c a3=0 items=0 ppid=2658 pid=5710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:20.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465363961623562353461373162643432353063316236633461636333 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { bpf } for pid=5710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { bpf } for pid=5710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { bpf } for pid=5710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { perfmon } for pid=5710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { perfmon } for pid=5710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { perfmon } for pid=5710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { perfmon } for pid=5710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { perfmon } for pid=5710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { bpf } for pid=5710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { bpf } for pid=5710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit: BPF prog-id=195 op=LOAD Jul 2 01:55:20.588000 audit[5710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001518e0 a2=78 a3=0 items=0 ppid=2658 pid=5710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:20.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465363961623562353461373162643432353063316236633461636333 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { bpf } for pid=5710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { bpf } for pid=5710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { perfmon } for pid=5710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { perfmon } for pid=5710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { perfmon } for pid=5710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { perfmon } for pid=5710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { perfmon } for pid=5710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { bpf } for pid=5710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { bpf } for pid=5710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit: BPF prog-id=196 op=LOAD Jul 2 01:55:20.588000 audit[5710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000151670 a2=78 a3=0 items=0 ppid=2658 pid=5710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:20.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465363961623562353461373162643432353063316236633461636333 Jul 2 01:55:20.588000 audit: BPF prog-id=196 op=UNLOAD Jul 2 01:55:20.588000 audit: BPF prog-id=195 op=UNLOAD Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { bpf } for pid=5710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { bpf } for pid=5710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { bpf } for pid=5710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { perfmon } for pid=5710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { perfmon } for pid=5710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { perfmon } for pid=5710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { perfmon } for pid=5710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { perfmon } for pid=5710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { bpf } for pid=5710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit[5710]: AVC avc: denied { bpf } for pid=5710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.588000 audit: BPF prog-id=197 op=LOAD Jul 2 01:55:20.588000 audit[5710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000151b40 a2=78 a3=0 items=0 ppid=2658 pid=5710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:20.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465363961623562353461373162643432353063316236633461636333 Jul 2 01:55:20.595239 systemd[1]: Started cri-containerd-81e8d47ccf9992a489f792bca39bb3384bb09234f26368be94ef370fa92109e4.scope. Jul 2 01:55:20.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.613000 audit: BPF prog-id=198 op=LOAD Jul 2 01:55:20.616000 audit[5728]: AVC avc: denied { bpf } for pid=5728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.616000 audit[5728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2261 pid=5728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:20.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831653864343763636639393932613438396637393262636133396262 Jul 2 01:55:20.616000 audit[5728]: AVC avc: denied { perfmon } for pid=5728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.616000 audit[5728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2261 pid=5728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:20.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831653864343763636639393932613438396637393262636133396262 Jul 2 01:55:20.616000 audit[5728]: AVC avc: denied { bpf } for pid=5728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.616000 audit[5728]: AVC avc: denied { bpf } for pid=5728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.616000 audit[5728]: AVC avc: denied { bpf } for pid=5728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.616000 audit[5728]: AVC avc: denied { perfmon } for pid=5728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.616000 audit[5728]: AVC avc: denied { perfmon } for pid=5728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.616000 audit[5728]: AVC avc: denied { perfmon } for pid=5728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.616000 audit[5728]: AVC avc: denied { perfmon } for pid=5728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.616000 audit[5728]: AVC avc: denied { perfmon } for pid=5728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.616000 audit[5728]: AVC avc: denied { bpf } for pid=5728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.616000 audit[5728]: AVC avc: denied { bpf } for pid=5728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.616000 audit: BPF prog-id=199 op=LOAD Jul 2 01:55:20.616000 audit[5728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2261 pid=5728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:20.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831653864343763636639393932613438396637393262636133396262 Jul 2 01:55:20.617000 audit[5728]: AVC avc: denied { bpf } for pid=5728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.617000 audit[5728]: AVC avc: denied { bpf } for pid=5728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.617000 audit[5728]: AVC avc: denied { perfmon } for pid=5728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.617000 audit[5728]: AVC avc: denied { perfmon } for pid=5728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.617000 audit[5728]: AVC avc: denied { perfmon } for pid=5728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.617000 audit[5728]: AVC avc: denied { perfmon } for pid=5728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.617000 audit[5728]: AVC avc: denied { perfmon } for pid=5728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.617000 audit[5728]: AVC avc: denied { bpf } for pid=5728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.617000 audit[5728]: AVC avc: denied { bpf } for pid=5728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.617000 audit: BPF prog-id=200 op=LOAD Jul 2 01:55:20.617000 audit[5728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2261 pid=5728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:20.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831653864343763636639393932613438396637393262636133396262 Jul 2 01:55:20.618000 audit: BPF prog-id=200 op=UNLOAD Jul 2 01:55:20.618000 audit: BPF prog-id=199 op=UNLOAD Jul 2 01:55:20.618000 audit[5728]: AVC avc: denied { bpf } for pid=5728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.618000 audit[5728]: AVC avc: denied { bpf } for pid=5728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.618000 audit[5728]: AVC avc: denied { bpf } for pid=5728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.618000 audit[5728]: AVC avc: denied { perfmon } for pid=5728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.618000 audit[5728]: AVC avc: denied { perfmon } for pid=5728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.618000 audit[5728]: AVC avc: denied { perfmon } for pid=5728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.618000 audit[5728]: AVC avc: denied { perfmon } for pid=5728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.618000 audit[5728]: AVC avc: denied { perfmon } for pid=5728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.618000 audit[5728]: AVC avc: denied { bpf } for pid=5728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.618000 audit[5728]: AVC avc: denied { bpf } for pid=5728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:20.618000 audit: BPF prog-id=201 op=LOAD Jul 2 01:55:20.618000 audit[5728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2261 pid=5728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:20.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831653864343763636639393932613438396637393262636133396262 Jul 2 01:55:20.625005 env[1468]: time="2024-07-02T01:55:20.624963651Z" level=info msg="StartContainer for \"4e69ab5b54a71bd4250c1b6c4acc3712b9fcdd3e85c39956cf5044d614ef703f\" returns successfully" Jul 2 01:55:20.646361 env[1468]: time="2024-07-02T01:55:20.646305075Z" level=info msg="StartContainer for \"81e8d47ccf9992a489f792bca39bb3384bb09234f26368be94ef370fa92109e4\" returns successfully" Jul 2 01:55:21.037663 systemd[1]: cri-containerd-4f2c47004adf7044dade1bcb468ba4193f6a2fd34c9e0ad97f5dcd6a75706968.scope: Deactivated successfully. Jul 2 01:55:21.038003 systemd[1]: cri-containerd-4f2c47004adf7044dade1bcb468ba4193f6a2fd34c9e0ad97f5dcd6a75706968.scope: Consumed 3.045s CPU time. Jul 2 01:55:21.041000 audit: BPF prog-id=78 op=UNLOAD Jul 2 01:55:21.041000 audit: BPF prog-id=97 op=UNLOAD Jul 2 01:55:21.066590 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4f2c47004adf7044dade1bcb468ba4193f6a2fd34c9e0ad97f5dcd6a75706968-rootfs.mount: Deactivated successfully. Jul 2 01:55:21.068718 env[1468]: time="2024-07-02T01:55:21.068672514Z" level=info msg="shim disconnected" id=4f2c47004adf7044dade1bcb468ba4193f6a2fd34c9e0ad97f5dcd6a75706968 Jul 2 01:55:21.068999 env[1468]: time="2024-07-02T01:55:21.068981157Z" level=warning msg="cleaning up after shim disconnected" id=4f2c47004adf7044dade1bcb468ba4193f6a2fd34c9e0ad97f5dcd6a75706968 namespace=k8s.io Jul 2 01:55:21.069091 env[1468]: time="2024-07-02T01:55:21.069076917Z" level=info msg="cleaning up dead shim" Jul 2 01:55:21.076818 env[1468]: time="2024-07-02T01:55:21.076733984Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:55:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5787 runtime=io.containerd.runc.v2\n" Jul 2 01:55:21.511593 kubelet[2577]: I0702 01:55:21.511148 2577 scope.go:117] "RemoveContainer" containerID="4f2c47004adf7044dade1bcb468ba4193f6a2fd34c9e0ad97f5dcd6a75706968" Jul 2 01:55:21.517899 env[1468]: time="2024-07-02T01:55:21.517859854Z" level=info msg="CreateContainer within sandbox \"e0a843a640d44a83b148a48ac34aa60bc8abdccb4fb7ad3500f30df87167627a\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Jul 2 01:55:21.564295 env[1468]: time="2024-07-02T01:55:21.564245457Z" level=info msg="CreateContainer within sandbox \"e0a843a640d44a83b148a48ac34aa60bc8abdccb4fb7ad3500f30df87167627a\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"bc88671eccee7778fdf7ace53bd81e12dfc38bfd1918f5c816153a9644fa1dc1\"" Jul 2 01:55:21.564992 env[1468]: time="2024-07-02T01:55:21.564966543Z" level=info msg="StartContainer for \"bc88671eccee7778fdf7ace53bd81e12dfc38bfd1918f5c816153a9644fa1dc1\"" Jul 2 01:55:21.592249 systemd[1]: Started cri-containerd-bc88671eccee7778fdf7ace53bd81e12dfc38bfd1918f5c816153a9644fa1dc1.scope. Jul 2 01:55:21.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.608000 audit: BPF prog-id=202 op=LOAD Jul 2 01:55:21.609000 audit[5809]: AVC avc: denied { bpf } for pid=5809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.609000 audit[5809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2277 pid=5809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:21.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263383836373165636365653737373866646637616365353362643831 Jul 2 01:55:21.609000 audit[5809]: AVC avc: denied { perfmon } for pid=5809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.609000 audit[5809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2277 pid=5809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:21.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263383836373165636365653737373866646637616365353362643831 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { bpf } for pid=5809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { bpf } for pid=5809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { bpf } for pid=5809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { perfmon } for pid=5809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { perfmon } for pid=5809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { perfmon } for pid=5809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { perfmon } for pid=5809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { perfmon } for pid=5809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { bpf } for pid=5809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { bpf } for pid=5809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit: BPF prog-id=203 op=LOAD Jul 2 01:55:21.610000 audit[5809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2277 pid=5809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:21.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263383836373165636365653737373866646637616365353362643831 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { bpf } for pid=5809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { bpf } for pid=5809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { perfmon } for pid=5809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { perfmon } for pid=5809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { perfmon } for pid=5809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { perfmon } for pid=5809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { perfmon } for pid=5809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { bpf } for pid=5809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit[5809]: AVC avc: denied { bpf } for pid=5809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.610000 audit: BPF prog-id=204 op=LOAD Jul 2 01:55:21.610000 audit[5809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2277 pid=5809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:21.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263383836373165636365653737373866646637616365353362643831 Jul 2 01:55:21.611000 audit: BPF prog-id=204 op=UNLOAD Jul 2 01:55:21.611000 audit: BPF prog-id=203 op=UNLOAD Jul 2 01:55:21.611000 audit[5809]: AVC avc: denied { bpf } for pid=5809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.611000 audit[5809]: AVC avc: denied { bpf } for pid=5809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.611000 audit[5809]: AVC avc: denied { bpf } for pid=5809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.611000 audit[5809]: AVC avc: denied { perfmon } for pid=5809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.611000 audit[5809]: AVC avc: denied { perfmon } for pid=5809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.611000 audit[5809]: AVC avc: denied { perfmon } for pid=5809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.611000 audit[5809]: AVC avc: denied { perfmon } for pid=5809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.611000 audit[5809]: AVC avc: denied { perfmon } for pid=5809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.611000 audit[5809]: AVC avc: denied { bpf } for pid=5809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.611000 audit[5809]: AVC avc: denied { bpf } for pid=5809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:21.611000 audit: BPF prog-id=205 op=LOAD Jul 2 01:55:21.611000 audit[5809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2277 pid=5809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:21.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263383836373165636365653737373866646637616365353362643831 Jul 2 01:55:21.633942 kubelet[2577]: E0702 01:55:21.633488 2577 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.5-a-6c47a6a388.17de42940290bab0", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.5-a-6c47a6a388", UID:"3d1954c9b8bafe1eb6795fb6a24b2857", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.5-a-6c47a6a388"}, FirstTimestamp:time.Date(2024, time.July, 2, 1, 55, 11, 167740592, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 1, 55, 11, 167740592, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.5-a-6c47a6a388"}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.4:38136->10.200.20.23:2379: read: connection timed out' (will not retry!) Jul 2 01:55:21.642278 env[1468]: time="2024-07-02T01:55:21.642226614Z" level=info msg="StartContainer for \"bc88671eccee7778fdf7ace53bd81e12dfc38bfd1918f5c816153a9644fa1dc1\" returns successfully" Jul 2 01:55:23.422000 audit[5820]: AVC avc: denied { watch } for pid=5820 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:23.428064 kernel: kauditd_printk_skb: 173 callbacks suppressed Jul 2 01:55:23.428191 kernel: audit: type=1400 audit(1719885323.422:1563): avc: denied { watch } for pid=5820 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:23.422000 audit[5820]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40009e4480 a2=fc6 a3=0 items=0 ppid=2277 pid=5820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:55:23.476814 kernel: audit: type=1300 audit(1719885323.422:1563): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40009e4480 a2=fc6 a3=0 items=0 ppid=2277 pid=5820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:55:23.422000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:23.501226 kernel: audit: type=1327 audit(1719885323.422:1563): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:23.422000 audit[5820]: AVC avc: denied { watch } for pid=5820 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:23.522627 kernel: audit: type=1400 audit(1719885323.422:1564): avc: denied { watch } for pid=5820 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:23.422000 audit[5820]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000fce040 a2=fc6 a3=0 items=0 ppid=2277 pid=5820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:55:23.550562 kernel: audit: type=1300 audit(1719885323.422:1564): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000fce040 a2=fc6 a3=0 items=0 ppid=2277 pid=5820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c618,c893 key=(null) Jul 2 01:55:23.422000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:23.574439 kernel: audit: type=1327 audit(1719885323.422:1564): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:30.416730 kubelet[2577]: E0702 01:55:30.416615 2577 request.go:1116] Unexpected error when reading response body: net/http: request canceled (Client.Timeout or context cancellation while reading body) Jul 2 01:55:30.417203 kubelet[2577]: E0702 01:55:30.417186 2577 controller.go:193] "Failed to update lease" err="unexpected error when reading response body. Please retry. Original error: net/http: request canceled (Client.Timeout or context cancellation while reading body)" Jul 2 01:55:32.129113 systemd[1]: cri-containerd-4e69ab5b54a71bd4250c1b6c4acc3712b9fcdd3e85c39956cf5044d614ef703f.scope: Deactivated successfully. Jul 2 01:55:32.128000 audit: BPF prog-id=194 op=UNLOAD Jul 2 01:55:32.136839 kernel: audit: type=1334 audit(1719885332.128:1565): prog-id=194 op=UNLOAD Jul 2 01:55:32.138000 audit: BPF prog-id=197 op=UNLOAD Jul 2 01:55:32.146873 kernel: audit: type=1334 audit(1719885332.138:1566): prog-id=197 op=UNLOAD Jul 2 01:55:32.158132 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4e69ab5b54a71bd4250c1b6c4acc3712b9fcdd3e85c39956cf5044d614ef703f-rootfs.mount: Deactivated successfully. Jul 2 01:55:32.237715 env[1468]: time="2024-07-02T01:55:32.237668416Z" level=info msg="shim disconnected" id=4e69ab5b54a71bd4250c1b6c4acc3712b9fcdd3e85c39956cf5044d614ef703f Jul 2 01:55:32.238217 env[1468]: time="2024-07-02T01:55:32.238194541Z" level=warning msg="cleaning up after shim disconnected" id=4e69ab5b54a71bd4250c1b6c4acc3712b9fcdd3e85c39956cf5044d614ef703f namespace=k8s.io Jul 2 01:55:32.238307 env[1468]: time="2024-07-02T01:55:32.238292582Z" level=info msg="cleaning up dead shim" Jul 2 01:55:32.245321 env[1468]: time="2024-07-02T01:55:32.245277328Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:55:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5857 runtime=io.containerd.runc.v2\n" Jul 2 01:55:32.570508 kubelet[2577]: I0702 01:55:32.570476 2577 scope.go:117] "RemoveContainer" containerID="034c789b2cb40fed6d48767b8cf7a7daabb61729dad6bb3dcd06ce84400d4cb6" Jul 2 01:55:32.570908 kubelet[2577]: I0702 01:55:32.570775 2577 scope.go:117] "RemoveContainer" containerID="4e69ab5b54a71bd4250c1b6c4acc3712b9fcdd3e85c39956cf5044d614ef703f" Jul 2 01:55:32.571062 kubelet[2577]: E0702 01:55:32.571035 2577 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-76c4974c85-7k8s9_tigera-operator(89ecf669-f803-4899-ae1b-fd6c8a0a0bfa)\"" pod="tigera-operator/tigera-operator-76c4974c85-7k8s9" podUID="89ecf669-f803-4899-ae1b-fd6c8a0a0bfa" Jul 2 01:55:32.572168 env[1468]: time="2024-07-02T01:55:32.572134344Z" level=info msg="RemoveContainer for \"034c789b2cb40fed6d48767b8cf7a7daabb61729dad6bb3dcd06ce84400d4cb6\"" Jul 2 01:55:32.584767 env[1468]: time="2024-07-02T01:55:32.584724943Z" level=info msg="RemoveContainer for \"034c789b2cb40fed6d48767b8cf7a7daabb61729dad6bb3dcd06ce84400d4cb6\" returns successfully" Jul 2 01:55:39.022309 systemd[1]: run-containerd-runc-k8s.io-51d203fa79ffe8596bb00cd8d734cbc4660338a3fd4989abcc4ab06e94ac0bcd-runc.CGj4zo.mount: Deactivated successfully. Jul 2 01:55:40.417710 kubelet[2577]: E0702 01:55:40.417668 2577 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-6c47a6a388?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 01:55:45.831543 kubelet[2577]: I0702 01:55:45.831513 2577 scope.go:117] "RemoveContainer" containerID="4e69ab5b54a71bd4250c1b6c4acc3712b9fcdd3e85c39956cf5044d614ef703f" Jul 2 01:55:45.834193 env[1468]: time="2024-07-02T01:55:45.834102902Z" level=info msg="CreateContainer within sandbox \"09e2e4c8b302d293b6d813ed9b5f4010454229ab9639282a1a1943c6685ef334\" for container &ContainerMetadata{Name:tigera-operator,Attempt:2,}" Jul 2 01:55:45.854673 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2467036556.mount: Deactivated successfully. Jul 2 01:55:45.862574 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4069757250.mount: Deactivated successfully. Jul 2 01:55:45.877458 env[1468]: time="2024-07-02T01:55:45.877417586Z" level=info msg="CreateContainer within sandbox \"09e2e4c8b302d293b6d813ed9b5f4010454229ab9639282a1a1943c6685ef334\" for &ContainerMetadata{Name:tigera-operator,Attempt:2,} returns container id \"e14e46b6fdf9749077f53c3d895af62a7b55b28a032f66566d57d7202cce3bf9\"" Jul 2 01:55:45.878078 env[1468]: time="2024-07-02T01:55:45.878056712Z" level=info msg="StartContainer for \"e14e46b6fdf9749077f53c3d895af62a7b55b28a032f66566d57d7202cce3bf9\"" Jul 2 01:55:45.895270 systemd[1]: Started cri-containerd-e14e46b6fdf9749077f53c3d895af62a7b55b28a032f66566d57d7202cce3bf9.scope. Jul 2 01:55:45.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.941562 kernel: audit: type=1400 audit(1719885345.909:1567): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.941662 kernel: audit: type=1400 audit(1719885345.909:1568): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.958408 kernel: audit: type=1400 audit(1719885345.909:1569): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.991032 kernel: audit: type=1400 audit(1719885345.909:1570): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.991113 kernel: audit: type=1400 audit(1719885345.909:1571): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:46.008406 kernel: audit: type=1400 audit(1719885345.909:1572): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:46.024688 kernel: audit: type=1400 audit(1719885345.909:1573): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:46.040908 kernel: audit: type=1400 audit(1719885345.909:1574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:46.057348 kernel: audit: type=1400 audit(1719885345.909:1575): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:46.077325 kernel: audit: type=1400 audit(1719885345.925:1576): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.925000 audit: BPF prog-id=206 op=LOAD Jul 2 01:55:45.941000 audit[5908]: AVC avc: denied { bpf } for pid=5908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.941000 audit[5908]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2658 pid=5908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:45.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531346534366236666466393734393037376635336333643839356166 Jul 2 01:55:45.941000 audit[5908]: AVC avc: denied { perfmon } for pid=5908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.941000 audit[5908]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2658 pid=5908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:45.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531346534366236666466393734393037376635336333643839356166 Jul 2 01:55:45.941000 audit[5908]: AVC avc: denied { bpf } for pid=5908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.941000 audit[5908]: AVC avc: denied { bpf } for pid=5908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.941000 audit[5908]: AVC avc: denied { bpf } for pid=5908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.941000 audit[5908]: AVC avc: denied { perfmon } for pid=5908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.941000 audit[5908]: AVC avc: denied { perfmon } for pid=5908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.941000 audit[5908]: AVC avc: denied { perfmon } for pid=5908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.941000 audit[5908]: AVC avc: denied { perfmon } for pid=5908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.941000 audit[5908]: AVC avc: denied { perfmon } for pid=5908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.941000 audit[5908]: AVC avc: denied { bpf } for pid=5908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.941000 audit[5908]: AVC avc: denied { bpf } for pid=5908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.941000 audit: BPF prog-id=207 op=LOAD Jul 2 01:55:45.941000 audit[5908]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2658 pid=5908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:45.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531346534366236666466393734393037376635336333643839356166 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { bpf } for pid=5908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { bpf } for pid=5908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { perfmon } for pid=5908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { perfmon } for pid=5908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { perfmon } for pid=5908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { perfmon } for pid=5908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { perfmon } for pid=5908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { bpf } for pid=5908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { bpf } for pid=5908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit: BPF prog-id=208 op=LOAD Jul 2 01:55:45.957000 audit[5908]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2658 pid=5908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:45.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531346534366236666466393734393037376635336333643839356166 Jul 2 01:55:45.957000 audit: BPF prog-id=208 op=UNLOAD Jul 2 01:55:45.957000 audit: BPF prog-id=207 op=UNLOAD Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { bpf } for pid=5908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { bpf } for pid=5908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { bpf } for pid=5908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { perfmon } for pid=5908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { perfmon } for pid=5908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { perfmon } for pid=5908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { perfmon } for pid=5908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { perfmon } for pid=5908 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { bpf } for pid=5908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit[5908]: AVC avc: denied { bpf } for pid=5908 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:45.957000 audit: BPF prog-id=209 op=LOAD Jul 2 01:55:45.957000 audit[5908]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2658 pid=5908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:45.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531346534366236666466393734393037376635336333643839356166 Jul 2 01:55:46.083480 env[1468]: time="2024-07-02T01:55:46.081153556Z" level=info msg="StartContainer for \"e14e46b6fdf9749077f53c3d895af62a7b55b28a032f66566d57d7202cce3bf9\" returns successfully" Jul 2 01:55:49.744311 systemd[1]: run-containerd-runc-k8s.io-2138fa7b34eebd4db73c5c430ba820a5f7f8139a4148f9f556cb4829b12aa281-runc.6wxHdI.mount: Deactivated successfully. Jul 2 01:55:50.419372 kubelet[2577]: E0702 01:55:50.419330 2577 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-6c47a6a388?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 01:55:50.419372 kubelet[2577]: I0702 01:55:50.419370 2577 controller.go:116] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease"