Jul 2 01:49:14.991016 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Jul 2 01:49:14.991035 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Jul 1 23:37:37 -00 2024 Jul 2 01:49:14.991043 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Jul 2 01:49:14.991050 kernel: printk: bootconsole [pl11] enabled Jul 2 01:49:14.991055 kernel: efi: EFI v2.70 by EDK II Jul 2 01:49:14.991060 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37b33f98 Jul 2 01:49:14.991067 kernel: random: crng init done Jul 2 01:49:14.991073 kernel: ACPI: Early table checksum verification disabled Jul 2 01:49:14.991078 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Jul 2 01:49:14.991083 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:14.991089 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:14.991095 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Jul 2 01:49:14.991101 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:14.991106 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:14.991113 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:14.991118 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:14.991124 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:14.991131 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:14.991137 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Jul 2 01:49:14.991142 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Jul 2 01:49:14.991148 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Jul 2 01:49:14.991154 kernel: NUMA: Failed to initialise from firmware Jul 2 01:49:14.991160 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Jul 2 01:49:14.991166 kernel: NUMA: NODE_DATA [mem 0x1bf7f1900-0x1bf7f6fff] Jul 2 01:49:14.991172 kernel: Zone ranges: Jul 2 01:49:14.991177 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Jul 2 01:49:14.991183 kernel: DMA32 empty Jul 2 01:49:14.991190 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Jul 2 01:49:14.991195 kernel: Movable zone start for each node Jul 2 01:49:14.991201 kernel: Early memory node ranges Jul 2 01:49:14.991206 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Jul 2 01:49:14.991212 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Jul 2 01:49:14.991218 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Jul 2 01:49:14.991224 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Jul 2 01:49:14.991229 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Jul 2 01:49:14.991235 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Jul 2 01:49:14.991240 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Jul 2 01:49:14.991246 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Jul 2 01:49:14.991252 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Jul 2 01:49:14.991259 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Jul 2 01:49:14.991267 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Jul 2 01:49:14.991273 kernel: psci: probing for conduit method from ACPI. Jul 2 01:49:14.991279 kernel: psci: PSCIv1.1 detected in firmware. Jul 2 01:49:14.991285 kernel: psci: Using standard PSCI v0.2 function IDs Jul 2 01:49:14.991293 kernel: psci: MIGRATE_INFO_TYPE not supported. Jul 2 01:49:14.991299 kernel: psci: SMC Calling Convention v1.4 Jul 2 01:49:14.991305 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Jul 2 01:49:14.991311 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Jul 2 01:49:14.991317 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Jul 2 01:49:14.991323 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Jul 2 01:49:14.991329 kernel: pcpu-alloc: [0] 0 [0] 1 Jul 2 01:49:14.991335 kernel: Detected PIPT I-cache on CPU0 Jul 2 01:49:14.991341 kernel: CPU features: detected: GIC system register CPU interface Jul 2 01:49:14.991347 kernel: CPU features: detected: Hardware dirty bit management Jul 2 01:49:14.991353 kernel: CPU features: detected: Spectre-BHB Jul 2 01:49:14.991359 kernel: CPU features: kernel page table isolation forced ON by KASLR Jul 2 01:49:14.991366 kernel: CPU features: detected: Kernel page table isolation (KPTI) Jul 2 01:49:14.991372 kernel: CPU features: detected: ARM erratum 1418040 Jul 2 01:49:14.991378 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Jul 2 01:49:14.991384 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Jul 2 01:49:14.991390 kernel: Policy zone: Normal Jul 2 01:49:14.991398 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 01:49:14.991404 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 01:49:14.991410 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 01:49:14.991417 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 01:49:14.991423 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 01:49:14.991430 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Jul 2 01:49:14.991436 kernel: Memory: 3990260K/4194160K available (9792K kernel code, 2092K rwdata, 7572K rodata, 36352K init, 777K bss, 203900K reserved, 0K cma-reserved) Jul 2 01:49:14.991442 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 01:49:14.991448 kernel: trace event string verifier disabled Jul 2 01:49:14.991454 kernel: rcu: Preemptible hierarchical RCU implementation. Jul 2 01:49:14.991461 kernel: rcu: RCU event tracing is enabled. Jul 2 01:49:14.991467 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 01:49:14.991473 kernel: Trampoline variant of Tasks RCU enabled. Jul 2 01:49:14.991479 kernel: Tracing variant of Tasks RCU enabled. Jul 2 01:49:14.991485 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 01:49:14.991491 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 01:49:14.991498 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Jul 2 01:49:14.991504 kernel: GICv3: 960 SPIs implemented Jul 2 01:49:14.991511 kernel: GICv3: 0 Extended SPIs implemented Jul 2 01:49:14.991517 kernel: GICv3: Distributor has no Range Selector support Jul 2 01:49:14.991522 kernel: Root IRQ handler: gic_handle_irq Jul 2 01:49:14.991529 kernel: GICv3: 16 PPIs implemented Jul 2 01:49:14.991535 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Jul 2 01:49:14.991541 kernel: ITS: No ITS available, not enabling LPIs Jul 2 01:49:14.991547 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 01:49:14.991553 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Jul 2 01:49:14.991560 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Jul 2 01:49:14.991566 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Jul 2 01:49:14.991573 kernel: Console: colour dummy device 80x25 Jul 2 01:49:14.991579 kernel: printk: console [tty1] enabled Jul 2 01:49:14.991586 kernel: ACPI: Core revision 20210730 Jul 2 01:49:14.991593 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Jul 2 01:49:14.991599 kernel: pid_max: default: 32768 minimum: 301 Jul 2 01:49:14.991605 kernel: LSM: Security Framework initializing Jul 2 01:49:14.991611 kernel: SELinux: Initializing. Jul 2 01:49:14.991617 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 01:49:14.991624 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 01:49:14.991631 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Jul 2 01:49:14.991638 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Jul 2 01:49:14.991644 kernel: rcu: Hierarchical SRCU implementation. Jul 2 01:49:14.991650 kernel: Remapping and enabling EFI services. Jul 2 01:49:14.991656 kernel: smp: Bringing up secondary CPUs ... Jul 2 01:49:14.991662 kernel: Detected PIPT I-cache on CPU1 Jul 2 01:49:14.991668 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Jul 2 01:49:14.991674 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 01:49:14.991681 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Jul 2 01:49:14.991688 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 01:49:14.991694 kernel: SMP: Total of 2 processors activated. Jul 2 01:49:14.991700 kernel: CPU features: detected: 32-bit EL0 Support Jul 2 01:49:14.991706 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Jul 2 01:49:14.991713 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Jul 2 01:49:14.991719 kernel: CPU features: detected: CRC32 instructions Jul 2 01:49:14.991725 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Jul 2 01:49:14.991731 kernel: CPU features: detected: LSE atomic instructions Jul 2 01:49:14.991737 kernel: CPU features: detected: Privileged Access Never Jul 2 01:49:14.991744 kernel: CPU: All CPU(s) started at EL1 Jul 2 01:49:14.991751 kernel: alternatives: patching kernel code Jul 2 01:49:14.991761 kernel: devtmpfs: initialized Jul 2 01:49:14.991768 kernel: KASLR enabled Jul 2 01:49:14.991775 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 01:49:14.991781 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 01:49:14.991788 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 01:49:14.991794 kernel: SMBIOS 3.1.0 present. Jul 2 01:49:14.991800 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 11/28/2023 Jul 2 01:49:14.991807 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 01:49:14.991815 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Jul 2 01:49:14.991822 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jul 2 01:49:14.991828 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jul 2 01:49:14.991835 kernel: audit: initializing netlink subsys (disabled) Jul 2 01:49:14.991841 kernel: audit: type=2000 audit(0.086:1): state=initialized audit_enabled=0 res=1 Jul 2 01:49:14.991848 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 01:49:14.991854 kernel: cpuidle: using governor menu Jul 2 01:49:14.991862 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Jul 2 01:49:14.999940 kernel: ASID allocator initialised with 32768 entries Jul 2 01:49:14.999950 kernel: ACPI: bus type PCI registered Jul 2 01:49:14.999957 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 01:49:14.999965 kernel: Serial: AMBA PL011 UART driver Jul 2 01:49:14.999972 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 01:49:14.999979 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Jul 2 01:49:14.999986 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 01:49:14.999993 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Jul 2 01:49:15.000007 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 01:49:15.000014 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Jul 2 01:49:15.000021 kernel: ACPI: Added _OSI(Module Device) Jul 2 01:49:15.000027 kernel: ACPI: Added _OSI(Processor Device) Jul 2 01:49:15.000034 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 01:49:15.000041 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 01:49:15.000048 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 01:49:15.000055 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 01:49:15.000061 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 01:49:15.000069 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 01:49:15.000076 kernel: ACPI: Interpreter enabled Jul 2 01:49:15.000083 kernel: ACPI: Using GIC for interrupt routing Jul 2 01:49:15.000090 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Jul 2 01:49:15.000097 kernel: printk: console [ttyAMA0] enabled Jul 2 01:49:15.000104 kernel: printk: bootconsole [pl11] disabled Jul 2 01:49:15.000111 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Jul 2 01:49:15.000118 kernel: iommu: Default domain type: Translated Jul 2 01:49:15.000124 kernel: iommu: DMA domain TLB invalidation policy: strict mode Jul 2 01:49:15.000132 kernel: vgaarb: loaded Jul 2 01:49:15.000139 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 01:49:15.000146 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 01:49:15.000153 kernel: PTP clock support registered Jul 2 01:49:15.000160 kernel: Registered efivars operations Jul 2 01:49:15.000167 kernel: No ACPI PMU IRQ for CPU0 Jul 2 01:49:15.000174 kernel: No ACPI PMU IRQ for CPU1 Jul 2 01:49:15.000181 kernel: clocksource: Switched to clocksource arch_sys_counter Jul 2 01:49:15.000187 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 01:49:15.000196 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 01:49:15.000203 kernel: pnp: PnP ACPI init Jul 2 01:49:15.000210 kernel: pnp: PnP ACPI: found 0 devices Jul 2 01:49:15.000217 kernel: NET: Registered PF_INET protocol family Jul 2 01:49:15.000224 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 01:49:15.000231 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 2 01:49:15.000238 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 01:49:15.000245 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 01:49:15.000252 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 2 01:49:15.000261 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 2 01:49:15.000267 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 01:49:15.000274 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 01:49:15.000281 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 01:49:15.000287 kernel: PCI: CLS 0 bytes, default 64 Jul 2 01:49:15.000294 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Jul 2 01:49:15.000301 kernel: kvm [1]: HYP mode not available Jul 2 01:49:15.000307 kernel: Initialise system trusted keyrings Jul 2 01:49:15.000314 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 2 01:49:15.000322 kernel: Key type asymmetric registered Jul 2 01:49:15.000328 kernel: Asymmetric key parser 'x509' registered Jul 2 01:49:15.000335 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 01:49:15.000341 kernel: io scheduler mq-deadline registered Jul 2 01:49:15.000348 kernel: io scheduler kyber registered Jul 2 01:49:15.000354 kernel: io scheduler bfq registered Jul 2 01:49:15.000361 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 01:49:15.000367 kernel: thunder_xcv, ver 1.0 Jul 2 01:49:15.000374 kernel: thunder_bgx, ver 1.0 Jul 2 01:49:15.000381 kernel: nicpf, ver 1.0 Jul 2 01:49:15.000388 kernel: nicvf, ver 1.0 Jul 2 01:49:15.000522 kernel: rtc-efi rtc-efi.0: registered as rtc0 Jul 2 01:49:15.000588 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-07-02T01:49:14 UTC (1719884954) Jul 2 01:49:15.000598 kernel: efifb: probing for efifb Jul 2 01:49:15.000605 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Jul 2 01:49:15.000612 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Jul 2 01:49:15.000619 kernel: efifb: scrolling: redraw Jul 2 01:49:15.000628 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Jul 2 01:49:15.000635 kernel: Console: switching to colour frame buffer device 128x48 Jul 2 01:49:15.000642 kernel: fb0: EFI VGA frame buffer device Jul 2 01:49:15.000649 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Jul 2 01:49:15.000656 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 2 01:49:15.000663 kernel: NET: Registered PF_INET6 protocol family Jul 2 01:49:15.000670 kernel: Segment Routing with IPv6 Jul 2 01:49:15.000676 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 01:49:15.000683 kernel: NET: Registered PF_PACKET protocol family Jul 2 01:49:15.000691 kernel: Key type dns_resolver registered Jul 2 01:49:15.000698 kernel: registered taskstats version 1 Jul 2 01:49:15.000705 kernel: Loading compiled-in X.509 certificates Jul 2 01:49:15.000712 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: c418313b450e4055b23e41c11cb6dc415de0265d' Jul 2 01:49:15.000718 kernel: Key type .fscrypt registered Jul 2 01:49:15.000725 kernel: Key type fscrypt-provisioning registered Jul 2 01:49:15.000732 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 01:49:15.000739 kernel: ima: Allocated hash algorithm: sha1 Jul 2 01:49:15.000745 kernel: ima: No architecture policies found Jul 2 01:49:15.000753 kernel: clk: Disabling unused clocks Jul 2 01:49:15.000760 kernel: Freeing unused kernel memory: 36352K Jul 2 01:49:15.000766 kernel: Run /init as init process Jul 2 01:49:15.000773 kernel: with arguments: Jul 2 01:49:15.000780 kernel: /init Jul 2 01:49:15.000787 kernel: with environment: Jul 2 01:49:15.000793 kernel: HOME=/ Jul 2 01:49:15.000800 kernel: TERM=linux Jul 2 01:49:15.000806 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 01:49:15.000817 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 01:49:15.000826 systemd[1]: Detected virtualization microsoft. Jul 2 01:49:15.000834 systemd[1]: Detected architecture arm64. Jul 2 01:49:15.000841 systemd[1]: Running in initrd. Jul 2 01:49:15.000848 systemd[1]: No hostname configured, using default hostname. Jul 2 01:49:15.000855 systemd[1]: Hostname set to . Jul 2 01:49:15.000878 systemd[1]: Initializing machine ID from random generator. Jul 2 01:49:15.000890 systemd[1]: Queued start job for default target initrd.target. Jul 2 01:49:15.000897 systemd[1]: Started systemd-ask-password-console.path. Jul 2 01:49:15.000905 systemd[1]: Reached target cryptsetup.target. Jul 2 01:49:15.000912 systemd[1]: Reached target paths.target. Jul 2 01:49:15.000919 systemd[1]: Reached target slices.target. Jul 2 01:49:15.000926 systemd[1]: Reached target swap.target. Jul 2 01:49:15.000933 systemd[1]: Reached target timers.target. Jul 2 01:49:15.000941 systemd[1]: Listening on iscsid.socket. Jul 2 01:49:15.000950 systemd[1]: Listening on iscsiuio.socket. Jul 2 01:49:15.000957 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 01:49:15.000964 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 01:49:15.000972 systemd[1]: Listening on systemd-journald.socket. Jul 2 01:49:15.000979 systemd[1]: Listening on systemd-networkd.socket. Jul 2 01:49:15.000986 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 01:49:15.000994 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 01:49:15.001001 systemd[1]: Reached target sockets.target. Jul 2 01:49:15.001008 systemd[1]: Starting kmod-static-nodes.service... Jul 2 01:49:15.001016 systemd[1]: Finished network-cleanup.service. Jul 2 01:49:15.001023 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 01:49:15.001031 systemd[1]: Starting systemd-journald.service... Jul 2 01:49:15.001037 systemd[1]: Starting systemd-modules-load.service... Jul 2 01:49:15.001044 systemd[1]: Starting systemd-resolved.service... Jul 2 01:49:15.001051 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 01:49:15.001063 systemd-journald[276]: Journal started Jul 2 01:49:15.001109 systemd-journald[276]: Runtime Journal (/run/log/journal/ba0b81a0d20a4c04a7f1edc6d694071a) is 8.0M, max 78.6M, 70.6M free. Jul 2 01:49:14.995144 systemd-modules-load[277]: Inserted module 'overlay' Jul 2 01:49:15.030883 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 01:49:15.043016 systemd[1]: Started systemd-journald.service. Jul 2 01:49:15.043083 kernel: Bridge firewalling registered Jul 2 01:49:15.043176 systemd-modules-load[277]: Inserted module 'br_netfilter' Jul 2 01:49:15.061280 kernel: audit: type=1130 audit(1719884955.042:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.043613 systemd[1]: Finished kmod-static-nodes.service. Jul 2 01:49:15.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.050573 systemd-resolved[278]: Positive Trust Anchors: Jul 2 01:49:15.119518 kernel: audit: type=1130 audit(1719884955.071:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.119540 kernel: SCSI subsystem initialized Jul 2 01:49:15.119549 kernel: audit: type=1130 audit(1719884955.099:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.050581 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 01:49:15.155733 kernel: audit: type=1130 audit(1719884955.123:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.155754 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 01:49:15.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.050609 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 01:49:15.210892 kernel: audit: type=1130 audit(1719884955.161:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.210921 kernel: device-mapper: uevent: version 1.0.3 Jul 2 01:49:15.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.052858 systemd-resolved[278]: Defaulting to hostname 'linux'. Jul 2 01:49:15.226259 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 01:49:15.072104 systemd[1]: Started systemd-resolved.service. Jul 2 01:49:15.100223 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 01:49:15.124183 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 01:49:15.283115 kernel: audit: type=1130 audit(1719884955.253:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.161816 systemd[1]: Reached target nss-lookup.target. Jul 2 01:49:15.220008 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 01:49:15.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.237068 systemd-modules-load[277]: Inserted module 'dm_multipath' Jul 2 01:49:15.356348 kernel: audit: type=1130 audit(1719884955.294:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.356372 kernel: audit: type=1130 audit(1719884955.327:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.239809 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 01:49:15.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.248520 systemd[1]: Finished systemd-modules-load.service. Jul 2 01:49:15.392812 kernel: audit: type=1130 audit(1719884955.361:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.254954 systemd[1]: Starting systemd-sysctl.service... Jul 2 01:49:15.289182 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 01:49:15.295137 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 01:49:15.328314 systemd[1]: Finished systemd-sysctl.service. Jul 2 01:49:15.366456 systemd[1]: Starting dracut-cmdline.service... Jul 2 01:49:15.422479 dracut-cmdline[300]: dracut-dracut-053 Jul 2 01:49:15.422479 dracut-cmdline[300]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 01:49:15.482888 kernel: Loading iSCSI transport class v2.0-870. Jul 2 01:49:15.496901 kernel: iscsi: registered transport (tcp) Jul 2 01:49:15.518063 kernel: iscsi: registered transport (qla4xxx) Jul 2 01:49:15.518129 kernel: QLogic iSCSI HBA Driver Jul 2 01:49:15.553918 systemd[1]: Finished dracut-cmdline.service. Jul 2 01:49:15.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:15.559314 systemd[1]: Starting dracut-pre-udev.service... Jul 2 01:49:15.611891 kernel: raid6: neonx8 gen() 13819 MB/s Jul 2 01:49:15.633885 kernel: raid6: neonx8 xor() 10830 MB/s Jul 2 01:49:15.653878 kernel: raid6: neonx4 gen() 13568 MB/s Jul 2 01:49:15.673874 kernel: raid6: neonx4 xor() 11288 MB/s Jul 2 01:49:15.694875 kernel: raid6: neonx2 gen() 12981 MB/s Jul 2 01:49:15.714877 kernel: raid6: neonx2 xor() 10395 MB/s Jul 2 01:49:15.734878 kernel: raid6: neonx1 gen() 10570 MB/s Jul 2 01:49:15.755880 kernel: raid6: neonx1 xor() 8800 MB/s Jul 2 01:49:15.776878 kernel: raid6: int64x8 gen() 6265 MB/s Jul 2 01:49:15.796878 kernel: raid6: int64x8 xor() 3546 MB/s Jul 2 01:49:15.817875 kernel: raid6: int64x4 gen() 7267 MB/s Jul 2 01:49:15.837874 kernel: raid6: int64x4 xor() 3859 MB/s Jul 2 01:49:15.857874 kernel: raid6: int64x2 gen() 6156 MB/s Jul 2 01:49:15.878875 kernel: raid6: int64x2 xor() 3322 MB/s Jul 2 01:49:15.899875 kernel: raid6: int64x1 gen() 5031 MB/s Jul 2 01:49:15.924147 kernel: raid6: int64x1 xor() 2644 MB/s Jul 2 01:49:15.924166 kernel: raid6: using algorithm neonx8 gen() 13819 MB/s Jul 2 01:49:15.924182 kernel: raid6: .... xor() 10830 MB/s, rmw enabled Jul 2 01:49:15.928277 kernel: raid6: using neon recovery algorithm Jul 2 01:49:15.952824 kernel: xor: measuring software checksum speed Jul 2 01:49:15.952837 kernel: 8regs : 17300 MB/sec Jul 2 01:49:15.960753 kernel: 32regs : 20760 MB/sec Jul 2 01:49:15.960763 kernel: arm64_neon : 27930 MB/sec Jul 2 01:49:15.960774 kernel: xor: using function: arm64_neon (27930 MB/sec) Jul 2 01:49:16.020885 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Jul 2 01:49:16.032192 systemd[1]: Finished dracut-pre-udev.service. Jul 2 01:49:16.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:16.039000 audit: BPF prog-id=7 op=LOAD Jul 2 01:49:16.039000 audit: BPF prog-id=8 op=LOAD Jul 2 01:49:16.040802 systemd[1]: Starting systemd-udevd.service... Jul 2 01:49:16.055617 systemd-udevd[476]: Using default interface naming scheme 'v252'. Jul 2 01:49:16.061978 systemd[1]: Started systemd-udevd.service. Jul 2 01:49:16.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:16.073413 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 01:49:16.090851 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Jul 2 01:49:16.119428 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 01:49:16.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:16.125326 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 01:49:16.161824 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 01:49:16.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:16.215895 kernel: hv_vmbus: Vmbus version:5.3 Jul 2 01:49:16.219886 kernel: hv_vmbus: registering driver hyperv_keyboard Jul 2 01:49:16.225041 kernel: hv_vmbus: registering driver hid_hyperv Jul 2 01:49:16.225085 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Jul 2 01:49:16.225096 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Jul 2 01:49:16.225112 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Jul 2 01:49:16.272318 kernel: hv_vmbus: registering driver hv_netvsc Jul 2 01:49:16.272370 kernel: hv_vmbus: registering driver hv_storvsc Jul 2 01:49:16.273360 kernel: scsi host0: storvsc_host_t Jul 2 01:49:16.280980 kernel: scsi host1: storvsc_host_t Jul 2 01:49:16.281889 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Jul 2 01:49:16.297851 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Jul 2 01:49:16.321092 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Jul 2 01:49:16.321385 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 2 01:49:16.321889 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Jul 2 01:49:16.334482 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Jul 2 01:49:16.334723 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Jul 2 01:49:16.338743 kernel: sd 0:0:0:0: [sda] Write Protect is off Jul 2 01:49:16.345609 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Jul 2 01:49:16.345788 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Jul 2 01:49:16.355366 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 01:49:16.355419 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Jul 2 01:49:16.385904 kernel: hv_netvsc 002248b3-fbd9-0022-48b3-fbd9002248b3 eth0: VF slot 1 added Jul 2 01:49:16.393885 kernel: hv_vmbus: registering driver hv_pci Jul 2 01:49:16.403626 kernel: hv_pci fc936fe2-30f7-4588-ac73-d7b195d462fd: PCI VMBus probing: Using version 0x10004 Jul 2 01:49:16.415853 kernel: hv_pci fc936fe2-30f7-4588-ac73-d7b195d462fd: PCI host bridge to bus 30f7:00 Jul 2 01:49:16.416040 kernel: pci_bus 30f7:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Jul 2 01:49:16.422448 kernel: pci_bus 30f7:00: No busn resource found for root bus, will use [bus 00-ff] Jul 2 01:49:16.429355 kernel: pci 30f7:00:02.0: [15b3:1018] type 00 class 0x020000 Jul 2 01:49:16.441826 kernel: pci 30f7:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Jul 2 01:49:16.461900 kernel: pci 30f7:00:02.0: enabling Extended Tags Jul 2 01:49:16.486038 kernel: pci 30f7:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 30f7:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Jul 2 01:49:16.486286 kernel: pci_bus 30f7:00: busn_res: [bus 00-ff] end is updated to 00 Jul 2 01:49:16.486371 kernel: pci 30f7:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Jul 2 01:49:16.533897 kernel: mlx5_core 30f7:00:02.0: firmware version: 16.30.1284 Jul 2 01:49:16.687915 kernel: mlx5_core 30f7:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Jul 2 01:49:16.744931 kernel: hv_netvsc 002248b3-fbd9-0022-48b3-fbd9002248b3 eth0: VF registering: eth1 Jul 2 01:49:16.745137 kernel: mlx5_core 30f7:00:02.0 eth1: joined to eth0 Jul 2 01:49:16.763895 kernel: mlx5_core 30f7:00:02.0 enP12535s1: renamed from eth1 Jul 2 01:49:16.767736 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 01:49:16.786393 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (536) Jul 2 01:49:16.802398 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 01:49:16.952646 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 01:49:16.982449 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 01:49:16.989649 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 01:49:17.004438 systemd[1]: Starting disk-uuid.service... Jul 2 01:49:17.023887 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 01:49:18.038720 disk-uuid[600]: The operation has completed successfully. Jul 2 01:49:18.043450 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 01:49:18.098990 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 01:49:18.102025 systemd[1]: Finished disk-uuid.service. Jul 2 01:49:18.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:18.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:18.108105 systemd[1]: Starting verity-setup.service... Jul 2 01:49:18.146900 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Jul 2 01:49:18.327130 systemd[1]: Found device dev-mapper-usr.device. Jul 2 01:49:18.335802 systemd[1]: Finished verity-setup.service. Jul 2 01:49:18.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:18.344388 systemd[1]: Mounting sysusr-usr.mount... Jul 2 01:49:18.399917 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 01:49:18.400714 systemd[1]: Mounted sysusr-usr.mount. Jul 2 01:49:18.404643 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 01:49:18.405535 systemd[1]: Starting ignition-setup.service... Jul 2 01:49:18.413433 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 01:49:18.451053 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 01:49:18.451117 kernel: BTRFS info (device sda6): using free space tree Jul 2 01:49:18.455332 kernel: BTRFS info (device sda6): has skinny extents Jul 2 01:49:18.497913 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 01:49:18.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:18.505000 audit: BPF prog-id=9 op=LOAD Jul 2 01:49:18.507017 systemd[1]: Starting systemd-networkd.service... Jul 2 01:49:18.529508 systemd-networkd[868]: lo: Link UP Jul 2 01:49:18.529522 systemd-networkd[868]: lo: Gained carrier Jul 2 01:49:18.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:18.530345 systemd-networkd[868]: Enumeration completed Jul 2 01:49:18.531446 systemd-networkd[868]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 01:49:18.534409 systemd[1]: Started systemd-networkd.service. Jul 2 01:49:18.543269 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 01:49:18.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:18.543557 systemd[1]: Reached target network.target. Jul 2 01:49:18.581124 iscsid[877]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 01:49:18.581124 iscsid[877]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 01:49:18.581124 iscsid[877]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 01:49:18.581124 iscsid[877]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 01:49:18.581124 iscsid[877]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 01:49:18.581124 iscsid[877]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 01:49:18.581124 iscsid[877]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 01:49:18.684501 kernel: mlx5_core 30f7:00:02.0 enP12535s1: Link up Jul 2 01:49:18.684747 kernel: hv_netvsc 002248b3-fbd9-0022-48b3-fbd9002248b3 eth0: Data path switched to VF: enP12535s1 Jul 2 01:49:18.684845 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:49:18.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:18.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:18.552699 systemd[1]: Starting iscsiuio.service... Jul 2 01:49:18.563550 systemd[1]: Started iscsiuio.service. Jul 2 01:49:18.576441 systemd[1]: Starting iscsid.service... Jul 2 01:49:18.591414 systemd[1]: Started iscsid.service. Jul 2 01:49:18.628894 systemd[1]: Starting dracut-initqueue.service... Jul 2 01:49:18.657203 systemd[1]: Finished dracut-initqueue.service. Jul 2 01:49:18.674412 systemd-networkd[868]: enP12535s1: Link UP Jul 2 01:49:18.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:18.674587 systemd-networkd[868]: eth0: Link UP Jul 2 01:49:18.674914 systemd-networkd[868]: eth0: Gained carrier Jul 2 01:49:18.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:18.680093 systemd[1]: Reached target remote-fs-pre.target. Jul 2 01:49:18.685240 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 01:49:18.690374 systemd-networkd[868]: enP12535s1: Gained carrier Jul 2 01:49:18.696751 systemd[1]: Reached target remote-fs.target. Jul 2 01:49:18.709561 systemd[1]: Starting dracut-pre-mount.service... Jul 2 01:49:18.713404 systemd-networkd[868]: eth0: DHCPv4 address 10.200.20.43/24, gateway 10.200.20.1 acquired from 168.63.129.16 Jul 2 01:49:18.721962 systemd[1]: Finished dracut-pre-mount.service. Jul 2 01:49:18.733625 systemd[1]: Finished ignition-setup.service. Jul 2 01:49:18.739114 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 01:49:20.465058 systemd-networkd[868]: eth0: Gained IPv6LL Jul 2 01:49:21.288450 ignition[892]: Ignition 2.14.0 Jul 2 01:49:21.289349 ignition[892]: Stage: fetch-offline Jul 2 01:49:21.289467 ignition[892]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:49:21.289507 ignition[892]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:49:21.339379 ignition[892]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:49:21.339567 ignition[892]: parsed url from cmdline: "" Jul 2 01:49:21.339572 ignition[892]: no config URL provided Jul 2 01:49:21.339577 ignition[892]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 01:49:21.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:21.351944 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 01:49:21.395036 kernel: kauditd_printk_skb: 18 callbacks suppressed Jul 2 01:49:21.395061 kernel: audit: type=1130 audit(1719884961.359:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:21.339587 ignition[892]: no config at "/usr/lib/ignition/user.ign" Jul 2 01:49:21.370315 systemd[1]: Starting ignition-fetch.service... Jul 2 01:49:21.339594 ignition[892]: failed to fetch config: resource requires networking Jul 2 01:49:21.340006 ignition[892]: Ignition finished successfully Jul 2 01:49:21.378027 ignition[898]: Ignition 2.14.0 Jul 2 01:49:21.378034 ignition[898]: Stage: fetch Jul 2 01:49:21.378150 ignition[898]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:49:21.378176 ignition[898]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:49:21.382447 ignition[898]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:49:21.382737 ignition[898]: parsed url from cmdline: "" Jul 2 01:49:21.382748 ignition[898]: no config URL provided Jul 2 01:49:21.382757 ignition[898]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 01:49:21.382770 ignition[898]: no config at "/usr/lib/ignition/user.ign" Jul 2 01:49:21.382815 ignition[898]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Jul 2 01:49:21.478970 ignition[898]: GET result: OK Jul 2 01:49:21.479078 ignition[898]: config has been read from IMDS userdata Jul 2 01:49:21.482074 unknown[898]: fetched base config from "system" Jul 2 01:49:21.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:21.479151 ignition[898]: parsing config with SHA512: 1ba71f77b293c0b68c871d9586d7fb5ad3216538d975b3cae7a694c944cc94828f0c0bcea98b2813f2a1ed19daa4dcd723d319b735934e5407df6bcd2db3d7b5 Jul 2 01:49:21.482082 unknown[898]: fetched base config from "system" Jul 2 01:49:21.522529 kernel: audit: type=1130 audit(1719884961.492:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:21.482603 ignition[898]: fetch: fetch complete Jul 2 01:49:21.482098 unknown[898]: fetched user config from "azure" Jul 2 01:49:21.482608 ignition[898]: fetch: fetch passed Jul 2 01:49:21.487812 systemd[1]: Finished ignition-fetch.service. Jul 2 01:49:21.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:21.482646 ignition[898]: Ignition finished successfully Jul 2 01:49:21.493533 systemd[1]: Starting ignition-kargs.service... Jul 2 01:49:21.574830 kernel: audit: type=1130 audit(1719884961.540:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:21.524718 ignition[904]: Ignition 2.14.0 Jul 2 01:49:21.601953 kernel: audit: type=1130 audit(1719884961.581:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:21.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:21.536118 systemd[1]: Finished ignition-kargs.service. Jul 2 01:49:21.524723 ignition[904]: Stage: kargs Jul 2 01:49:21.563152 systemd[1]: Starting ignition-disks.service... Jul 2 01:49:21.524894 ignition[904]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:49:21.577946 systemd[1]: Finished ignition-disks.service. Jul 2 01:49:21.524940 ignition[904]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:49:21.582335 systemd[1]: Reached target initrd-root-device.target. Jul 2 01:49:21.531515 ignition[904]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:49:21.606511 systemd[1]: Reached target local-fs-pre.target. Jul 2 01:49:21.534270 ignition[904]: kargs: kargs passed Jul 2 01:49:21.614103 systemd[1]: Reached target local-fs.target. Jul 2 01:49:21.534353 ignition[904]: Ignition finished successfully Jul 2 01:49:21.621395 systemd[1]: Reached target sysinit.target. Jul 2 01:49:21.570161 ignition[910]: Ignition 2.14.0 Jul 2 01:49:21.628895 systemd[1]: Reached target basic.target. Jul 2 01:49:21.570167 ignition[910]: Stage: disks Jul 2 01:49:21.642084 systemd[1]: Starting systemd-fsck-root.service... Jul 2 01:49:21.570282 ignition[910]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:49:21.570300 ignition[910]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:49:21.573401 ignition[910]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:49:21.575723 ignition[910]: disks: disks passed Jul 2 01:49:21.575780 ignition[910]: Ignition finished successfully Jul 2 01:49:21.770164 systemd-fsck[918]: ROOT: clean, 614/7326000 files, 481075/7359488 blocks Jul 2 01:49:21.784793 systemd[1]: Finished systemd-fsck-root.service. Jul 2 01:49:21.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:21.809308 systemd[1]: Mounting sysroot.mount... Jul 2 01:49:21.817563 kernel: audit: type=1130 audit(1719884961.788:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:21.829890 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 01:49:21.829900 systemd[1]: Mounted sysroot.mount. Jul 2 01:49:21.833442 systemd[1]: Reached target initrd-root-fs.target. Jul 2 01:49:21.871048 systemd[1]: Mounting sysroot-usr.mount... Jul 2 01:49:21.875678 systemd[1]: Starting flatcar-metadata-hostname.service... Jul 2 01:49:21.887125 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 01:49:21.887178 systemd[1]: Reached target ignition-diskful.target. Jul 2 01:49:21.901572 systemd[1]: Mounted sysroot-usr.mount. Jul 2 01:49:21.954299 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 01:49:21.959422 systemd[1]: Starting initrd-setup-root.service... Jul 2 01:49:21.979988 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (929) Jul 2 01:49:21.991175 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 01:49:21.991221 kernel: BTRFS info (device sda6): using free space tree Jul 2 01:49:21.995632 kernel: BTRFS info (device sda6): has skinny extents Jul 2 01:49:21.995653 initrd-setup-root[934]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 01:49:22.006286 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 01:49:22.032484 initrd-setup-root[960]: cut: /sysroot/etc/group: No such file or directory Jul 2 01:49:22.056315 initrd-setup-root[968]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 01:49:22.065374 initrd-setup-root[976]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 01:49:22.638538 systemd[1]: Finished initrd-setup-root.service. Jul 2 01:49:22.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:22.661609 systemd[1]: Starting ignition-mount.service... Jul 2 01:49:22.671306 kernel: audit: type=1130 audit(1719884962.642:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:22.667619 systemd[1]: Starting sysroot-boot.service... Jul 2 01:49:22.677458 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 01:49:22.677561 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 01:49:22.705254 ignition[996]: INFO : Ignition 2.14.0 Jul 2 01:49:22.705254 ignition[996]: INFO : Stage: mount Jul 2 01:49:22.716127 ignition[996]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:49:22.716127 ignition[996]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:49:22.716127 ignition[996]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:49:22.716127 ignition[996]: INFO : mount: mount passed Jul 2 01:49:22.716127 ignition[996]: INFO : Ignition finished successfully Jul 2 01:49:22.788415 kernel: audit: type=1130 audit(1719884962.726:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:22.788441 kernel: audit: type=1130 audit(1719884962.759:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:22.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:22.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:22.717557 systemd[1]: Finished ignition-mount.service. Jul 2 01:49:22.754209 systemd[1]: Finished sysroot-boot.service. Jul 2 01:49:23.212345 coreos-metadata[928]: Jul 02 01:49:23.212 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Jul 2 01:49:23.221737 coreos-metadata[928]: Jul 02 01:49:23.221 INFO Fetch successful Jul 2 01:49:23.249791 coreos-metadata[928]: Jul 02 01:49:23.249 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Jul 2 01:49:23.265443 coreos-metadata[928]: Jul 02 01:49:23.265 INFO Fetch successful Jul 2 01:49:23.291262 coreos-metadata[928]: Jul 02 01:49:23.291 INFO wrote hostname ci-3510.3.5-a-118aa0dcdb to /sysroot/etc/hostname Jul 2 01:49:23.300031 systemd[1]: Finished flatcar-metadata-hostname.service. Jul 2 01:49:23.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.305702 systemd[1]: Starting ignition-files.service... Jul 2 01:49:23.331689 kernel: audit: type=1130 audit(1719884963.304:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:23.332823 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 01:49:23.355783 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (1007) Jul 2 01:49:23.355841 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 01:49:23.355851 kernel: BTRFS info (device sda6): using free space tree Jul 2 01:49:23.364460 kernel: BTRFS info (device sda6): has skinny extents Jul 2 01:49:23.368755 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 01:49:23.384663 ignition[1026]: INFO : Ignition 2.14.0 Jul 2 01:49:23.388579 ignition[1026]: INFO : Stage: files Jul 2 01:49:23.388579 ignition[1026]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:49:23.388579 ignition[1026]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:49:23.410767 ignition[1026]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:49:23.410767 ignition[1026]: DEBUG : files: compiled without relabeling support, skipping Jul 2 01:49:23.410767 ignition[1026]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 01:49:23.410767 ignition[1026]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 01:49:23.482431 ignition[1026]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 01:49:23.490231 ignition[1026]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 01:49:23.490231 ignition[1026]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 01:49:23.489829 unknown[1026]: wrote ssh authorized keys file for user: core Jul 2 01:49:23.509297 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Jul 2 01:49:23.509297 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Jul 2 01:49:23.763446 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Jul 2 01:49:23.982940 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Jul 2 01:49:23.995951 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Jul 2 01:49:23.995951 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 01:49:23.995951 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 2 01:49:23.995951 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 2 01:49:23.995951 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 01:49:23.995951 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 01:49:23.995951 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 01:49:23.995951 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 01:49:23.995951 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 01:49:23.995951 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 01:49:23.995951 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Jul 2 01:49:23.995951 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Jul 2 01:49:23.995951 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Jul 2 01:49:23.995951 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 01:49:24.147486 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1029) Jul 2 01:49:24.147525 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3370575499" Jul 2 01:49:24.147525 ignition[1026]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3370575499": device or resource busy Jul 2 01:49:24.147525 ignition[1026]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3370575499", trying btrfs: device or resource busy Jul 2 01:49:24.147525 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3370575499" Jul 2 01:49:24.147525 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3370575499" Jul 2 01:49:24.147525 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3370575499" Jul 2 01:49:24.147525 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3370575499" Jul 2 01:49:24.147525 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Jul 2 01:49:24.147525 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 01:49:24.147525 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 01:49:24.147525 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2627276244" Jul 2 01:49:24.147525 ignition[1026]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2627276244": device or resource busy Jul 2 01:49:24.147525 ignition[1026]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2627276244", trying btrfs: device or resource busy Jul 2 01:49:24.147525 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2627276244" Jul 2 01:49:24.294105 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2627276244" Jul 2 01:49:24.294105 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem2627276244" Jul 2 01:49:24.294105 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem2627276244" Jul 2 01:49:24.294105 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 2 01:49:24.294105 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Jul 2 01:49:24.294105 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-arm64.raw: attempt #1 Jul 2 01:49:24.462133 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK Jul 2 01:49:24.672251 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Jul 2 01:49:24.672251 ignition[1026]: INFO : files: op(13): [started] processing unit "waagent.service" Jul 2 01:49:24.672251 ignition[1026]: INFO : files: op(13): [finished] processing unit "waagent.service" Jul 2 01:49:24.672251 ignition[1026]: INFO : files: op(14): [started] processing unit "nvidia.service" Jul 2 01:49:24.672251 ignition[1026]: INFO : files: op(14): [finished] processing unit "nvidia.service" Jul 2 01:49:24.672251 ignition[1026]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Jul 2 01:49:24.752996 kernel: audit: type=1130 audit(1719884964.694:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.753119 ignition[1026]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 01:49:24.753119 ignition[1026]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 01:49:24.753119 ignition[1026]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Jul 2 01:49:24.753119 ignition[1026]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" Jul 2 01:49:24.753119 ignition[1026]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" Jul 2 01:49:24.753119 ignition[1026]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Jul 2 01:49:24.753119 ignition[1026]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Jul 2 01:49:24.753119 ignition[1026]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Jul 2 01:49:24.753119 ignition[1026]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Jul 2 01:49:24.753119 ignition[1026]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 01:49:24.753119 ignition[1026]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 01:49:24.753119 ignition[1026]: INFO : files: files passed Jul 2 01:49:24.753119 ignition[1026]: INFO : Ignition finished successfully Jul 2 01:49:24.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.685206 systemd[1]: Finished ignition-files.service. Jul 2 01:49:24.717480 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 01:49:24.722843 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 01:49:24.916414 initrd-setup-root-after-ignition[1052]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 01:49:24.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.729458 systemd[1]: Starting ignition-quench.service... Jul 2 01:49:24.741677 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 01:49:24.741773 systemd[1]: Finished ignition-quench.service. Jul 2 01:49:24.753317 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 01:49:24.767967 systemd[1]: Reached target ignition-complete.target. Jul 2 01:49:24.782921 systemd[1]: Starting initrd-parse-etc.service... Jul 2 01:49:24.808337 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 01:49:24.808444 systemd[1]: Finished initrd-parse-etc.service. Jul 2 01:49:24.817669 systemd[1]: Reached target initrd-fs.target. Jul 2 01:49:24.828399 systemd[1]: Reached target initrd.target. Jul 2 01:49:24.839267 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 01:49:24.840174 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 01:49:25.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.858231 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 01:49:24.864653 systemd[1]: Starting initrd-cleanup.service... Jul 2 01:49:25.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.883854 systemd[1]: Stopped target nss-lookup.target. Jul 2 01:49:25.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.890334 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 01:49:25.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.898321 systemd[1]: Stopped target timers.target. Jul 2 01:49:25.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.906930 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 01:49:24.907045 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 01:49:25.098988 ignition[1065]: INFO : Ignition 2.14.0 Jul 2 01:49:25.098988 ignition[1065]: INFO : Stage: umount Jul 2 01:49:25.098988 ignition[1065]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 01:49:25.098988 ignition[1065]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Jul 2 01:49:25.098988 ignition[1065]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Jul 2 01:49:25.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.920850 systemd[1]: Stopped target initrd.target. Jul 2 01:49:25.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.170215 ignition[1065]: INFO : umount: umount passed Jul 2 01:49:25.170215 ignition[1065]: INFO : Ignition finished successfully Jul 2 01:49:25.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.932320 systemd[1]: Stopped target basic.target. Jul 2 01:49:25.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.940261 systemd[1]: Stopped target ignition-complete.target. Jul 2 01:49:25.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.949256 systemd[1]: Stopped target ignition-diskful.target. Jul 2 01:49:25.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.960033 systemd[1]: Stopped target initrd-root-device.target. Jul 2 01:49:24.969835 systemd[1]: Stopped target remote-fs.target. Jul 2 01:49:25.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:24.978798 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 01:49:24.987963 systemd[1]: Stopped target sysinit.target. Jul 2 01:49:24.996984 systemd[1]: Stopped target local-fs.target. Jul 2 01:49:25.005220 systemd[1]: Stopped target local-fs-pre.target. Jul 2 01:49:25.014029 systemd[1]: Stopped target swap.target. Jul 2 01:49:25.021999 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 01:49:25.022117 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 01:49:25.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.033422 systemd[1]: Stopped target cryptsetup.target. Jul 2 01:49:25.041388 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 01:49:25.041489 systemd[1]: Stopped dracut-initqueue.service. Jul 2 01:49:25.049509 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 01:49:25.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.049603 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 01:49:25.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.058613 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 01:49:25.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.354000 audit: BPF prog-id=6 op=UNLOAD Jul 2 01:49:25.058698 systemd[1]: Stopped ignition-files.service. Jul 2 01:49:25.066798 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Jul 2 01:49:25.066903 systemd[1]: Stopped flatcar-metadata-hostname.service. Jul 2 01:49:25.076738 systemd[1]: Stopping ignition-mount.service... Jul 2 01:49:25.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.092513 systemd[1]: Stopping iscsiuio.service... Jul 2 01:49:25.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.108180 systemd[1]: Stopping sysroot-boot.service... Jul 2 01:49:25.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.124356 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 01:49:25.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.124561 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 01:49:25.126129 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 01:49:25.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.126225 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 01:49:25.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.151338 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 01:49:25.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.151459 systemd[1]: Stopped iscsiuio.service. Jul 2 01:49:25.175858 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 01:49:25.176417 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 01:49:25.176529 systemd[1]: Stopped ignition-mount.service. Jul 2 01:49:25.511639 kernel: hv_netvsc 002248b3-fbd9-0022-48b3-fbd9002248b3 eth0: Data path switched from VF: enP12535s1 Jul 2 01:49:25.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.182769 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 01:49:25.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.182896 systemd[1]: Stopped ignition-disks.service. Jul 2 01:49:25.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.208051 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 01:49:25.208155 systemd[1]: Stopped ignition-kargs.service. Jul 2 01:49:25.216269 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 01:49:25.216357 systemd[1]: Stopped ignition-fetch.service. Jul 2 01:49:25.226254 systemd[1]: Stopped target network.target. Jul 2 01:49:25.234622 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 01:49:25.234739 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 01:49:25.244906 systemd[1]: Stopped target paths.target. Jul 2 01:49:25.252366 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 01:49:25.255905 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 01:49:25.260993 systemd[1]: Stopped target slices.target. Jul 2 01:49:25.268553 systemd[1]: Stopped target sockets.target. Jul 2 01:49:25.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.277677 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 01:49:25.277753 systemd[1]: Closed iscsid.socket. Jul 2 01:49:25.285618 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 01:49:25.285704 systemd[1]: Closed iscsiuio.socket. Jul 2 01:49:25.292848 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 01:49:25.292960 systemd[1]: Stopped ignition-setup.service. Jul 2 01:49:25.302378 systemd[1]: Stopping systemd-networkd.service... Jul 2 01:49:25.310153 systemd[1]: Stopping systemd-resolved.service... Jul 2 01:49:25.322672 systemd-networkd[868]: eth0: DHCPv6 lease lost Jul 2 01:49:25.635000 audit: BPF prog-id=9 op=UNLOAD Jul 2 01:49:25.323991 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 01:49:25.324094 systemd[1]: Stopped systemd-networkd.service. Jul 2 01:49:25.334593 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 01:49:25.334701 systemd[1]: Stopped systemd-resolved.service. Jul 2 01:49:25.346737 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 01:49:25.346830 systemd[1]: Finished initrd-cleanup.service. Jul 2 01:49:25.355192 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 01:49:25.355238 systemd[1]: Closed systemd-networkd.socket. Jul 2 01:49:25.367827 systemd[1]: Stopping network-cleanup.service... Jul 2 01:49:25.377699 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 01:49:25.377781 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 01:49:25.386277 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 01:49:25.386335 systemd[1]: Stopped systemd-sysctl.service. Jul 2 01:49:25.397981 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 01:49:25.398031 systemd[1]: Stopped systemd-modules-load.service. Jul 2 01:49:25.402982 systemd[1]: Stopping systemd-udevd.service... Jul 2 01:49:25.411981 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 01:49:25.412497 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 01:49:25.412618 systemd[1]: Stopped systemd-udevd.service. Jul 2 01:49:25.417766 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 01:49:25.417815 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 01:49:25.427281 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 01:49:25.427321 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 01:49:25.431692 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 01:49:25.431777 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 01:49:25.440510 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 01:49:25.440556 systemd[1]: Stopped dracut-cmdline.service. Jul 2 01:49:25.449942 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 01:49:25.449987 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 01:49:25.469436 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 01:49:25.489043 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 2 01:49:25.489148 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 2 01:49:25.511397 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 01:49:25.511489 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 01:49:25.516255 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 01:49:25.516305 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 01:49:25.527169 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 2 01:49:25.527672 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 01:49:25.527755 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 01:49:25.588341 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 01:49:25.588447 systemd[1]: Stopped network-cleanup.service. Jul 2 01:49:25.870264 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 01:49:25.870366 systemd[1]: Stopped sysroot-boot.service. Jul 2 01:49:25.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.879192 systemd[1]: Reached target initrd-switch-root.target. Jul 2 01:49:25.888052 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 01:49:25.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:25.888118 systemd[1]: Stopped initrd-setup-root.service. Jul 2 01:49:25.897017 systemd[1]: Starting initrd-switch-root.service... Jul 2 01:49:25.913065 systemd[1]: Switching root. Jul 2 01:49:25.939200 iscsid[877]: iscsid shutting down. Jul 2 01:49:25.942524 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Jul 2 01:49:25.942572 systemd-journald[276]: Journal stopped Jul 2 01:49:36.994791 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 01:49:36.994813 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 01:49:36.994823 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 01:49:36.994834 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 01:49:36.994842 kernel: SELinux: policy capability open_perms=1 Jul 2 01:49:36.994850 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 01:49:36.994859 kernel: SELinux: policy capability always_check_network=0 Jul 2 01:49:36.994894 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 01:49:36.994902 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 01:49:36.994910 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 01:49:36.994920 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 01:49:36.994927 kernel: kauditd_printk_skb: 42 callbacks suppressed Jul 2 01:49:36.994936 kernel: audit: type=1403 audit(1719884968.137:81): auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 01:49:36.994946 systemd[1]: Successfully loaded SELinux policy in 256.022ms. Jul 2 01:49:36.994957 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.059ms. Jul 2 01:49:36.994969 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 01:49:36.994978 systemd[1]: Detected virtualization microsoft. Jul 2 01:49:36.994987 systemd[1]: Detected architecture arm64. Jul 2 01:49:36.994996 systemd[1]: Detected first boot. Jul 2 01:49:36.995005 systemd[1]: Hostname set to . Jul 2 01:49:36.995017 systemd[1]: Initializing machine ID from random generator. Jul 2 01:49:36.995027 kernel: audit: type=1400 audit(1719884968.754:82): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:49:36.995037 kernel: audit: type=1400 audit(1719884968.754:83): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:49:36.995046 kernel: audit: type=1334 audit(1719884968.770:84): prog-id=10 op=LOAD Jul 2 01:49:36.995054 kernel: audit: type=1334 audit(1719884968.770:85): prog-id=10 op=UNLOAD Jul 2 01:49:36.995063 kernel: audit: type=1334 audit(1719884968.770:86): prog-id=11 op=LOAD Jul 2 01:49:36.995071 kernel: audit: type=1334 audit(1719884968.770:87): prog-id=11 op=UNLOAD Jul 2 01:49:36.995080 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 01:49:36.995090 kernel: audit: type=1400 audit(1719884970.104:88): avc: denied { associate } for pid=1099 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 01:49:36.995101 kernel: audit: type=1300 audit(1719884970.104:88): arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458b4 a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1082 pid=1099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:49:36.995110 kernel: audit: type=1327 audit(1719884970.104:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 01:49:36.995119 systemd[1]: Populated /etc with preset unit settings. Jul 2 01:49:36.995128 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 01:49:36.995138 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 01:49:36.995148 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 01:49:36.995158 kernel: kauditd_printk_skb: 6 callbacks suppressed Jul 2 01:49:36.995166 kernel: audit: type=1334 audit(1719884976.261:90): prog-id=12 op=LOAD Jul 2 01:49:36.995175 kernel: audit: type=1334 audit(1719884976.261:91): prog-id=3 op=UNLOAD Jul 2 01:49:36.995183 kernel: audit: type=1334 audit(1719884976.266:92): prog-id=13 op=LOAD Jul 2 01:49:36.995192 kernel: audit: type=1334 audit(1719884976.272:93): prog-id=14 op=LOAD Jul 2 01:49:36.995203 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 01:49:36.995213 kernel: audit: type=1334 audit(1719884976.272:94): prog-id=4 op=UNLOAD Jul 2 01:49:36.995222 kernel: audit: type=1334 audit(1719884976.272:95): prog-id=5 op=UNLOAD Jul 2 01:49:36.995231 kernel: audit: type=1131 audit(1719884976.283:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:36.995241 kernel: audit: type=1334 audit(1719884976.322:97): prog-id=12 op=UNLOAD Jul 2 01:49:36.995249 systemd[1]: Stopped iscsid.service. Jul 2 01:49:36.995259 kernel: audit: type=1131 audit(1719884976.334:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:36.995268 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 01:49:36.995278 systemd[1]: Stopped initrd-switch-root.service. Jul 2 01:49:36.995287 kernel: audit: type=1130 audit(1719884976.364:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:36.995297 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 01:49:36.995307 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 01:49:36.995316 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 01:49:36.995325 systemd[1]: Created slice system-getty.slice. Jul 2 01:49:36.995335 systemd[1]: Created slice system-modprobe.slice. Jul 2 01:49:36.995344 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 01:49:36.995353 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 01:49:36.995363 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 01:49:36.995372 systemd[1]: Created slice user.slice. Jul 2 01:49:36.995382 systemd[1]: Started systemd-ask-password-console.path. Jul 2 01:49:36.995392 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 01:49:36.995401 systemd[1]: Set up automount boot.automount. Jul 2 01:49:36.995411 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 01:49:36.995421 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 01:49:36.995430 systemd[1]: Stopped target initrd-fs.target. Jul 2 01:49:36.995439 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 01:49:36.995450 systemd[1]: Reached target integritysetup.target. Jul 2 01:49:36.995460 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 01:49:36.995610 systemd[1]: Reached target remote-fs.target. Jul 2 01:49:36.995625 systemd[1]: Reached target slices.target. Jul 2 01:49:36.995634 systemd[1]: Reached target swap.target. Jul 2 01:49:36.995644 systemd[1]: Reached target torcx.target. Jul 2 01:49:36.995654 systemd[1]: Reached target veritysetup.target. Jul 2 01:49:36.995664 systemd[1]: Listening on systemd-coredump.socket. Jul 2 01:49:36.995676 systemd[1]: Listening on systemd-initctl.socket. Jul 2 01:49:36.995686 systemd[1]: Listening on systemd-networkd.socket. Jul 2 01:49:36.995696 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 01:49:36.995705 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 01:49:36.995715 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 01:49:36.995725 systemd[1]: Mounting dev-hugepages.mount... Jul 2 01:49:36.995736 systemd[1]: Mounting dev-mqueue.mount... Jul 2 01:49:36.995745 systemd[1]: Mounting media.mount... Jul 2 01:49:36.995755 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 01:49:36.995767 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 01:49:36.995777 systemd[1]: Mounting tmp.mount... Jul 2 01:49:36.995786 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 01:49:36.995796 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:49:36.995805 systemd[1]: Starting kmod-static-nodes.service... Jul 2 01:49:36.995815 systemd[1]: Starting modprobe@configfs.service... Jul 2 01:49:36.995826 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:49:36.995835 systemd[1]: Starting modprobe@drm.service... Jul 2 01:49:36.995845 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:49:36.995854 systemd[1]: Starting modprobe@fuse.service... Jul 2 01:49:36.995875 systemd[1]: Starting modprobe@loop.service... Jul 2 01:49:36.995886 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 01:49:36.995897 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 01:49:36.995906 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 01:49:36.995916 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 01:49:36.995927 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 01:49:36.995936 systemd[1]: Stopped systemd-journald.service. Jul 2 01:49:36.995946 kernel: loop: module loaded Jul 2 01:49:36.995955 systemd[1]: systemd-journald.service: Consumed 2.841s CPU time. Jul 2 01:49:36.995964 systemd[1]: Starting systemd-journald.service... Jul 2 01:49:36.995973 kernel: fuse: init (API version 7.34) Jul 2 01:49:36.995984 systemd[1]: Starting systemd-modules-load.service... Jul 2 01:49:36.995993 systemd[1]: Starting systemd-network-generator.service... Jul 2 01:49:36.996003 systemd[1]: Starting systemd-remount-fs.service... Jul 2 01:49:36.996014 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 01:49:36.996024 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 01:49:36.996033 systemd[1]: Stopped verity-setup.service. Jul 2 01:49:36.996043 systemd[1]: Mounted dev-hugepages.mount. Jul 2 01:49:36.996057 systemd-journald[1205]: Journal started Jul 2 01:49:37.000819 systemd-journald[1205]: Runtime Journal (/run/log/journal/c31e503b94df4458a01779ec456710ff) is 8.0M, max 78.6M, 70.6M free. Jul 2 01:49:28.137000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 01:49:28.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:49:28.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:49:28.770000 audit: BPF prog-id=10 op=LOAD Jul 2 01:49:28.770000 audit: BPF prog-id=10 op=UNLOAD Jul 2 01:49:28.770000 audit: BPF prog-id=11 op=LOAD Jul 2 01:49:28.770000 audit: BPF prog-id=11 op=UNLOAD Jul 2 01:49:30.104000 audit[1099]: AVC avc: denied { associate } for pid=1099 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 01:49:30.104000 audit[1099]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458b4 a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1082 pid=1099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:49:30.104000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 01:49:30.132000 audit[1099]: AVC avc: denied { associate } for pid=1099 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 01:49:30.132000 audit[1099]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000022109 a2=1ed a3=0 items=2 ppid=1082 pid=1099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:49:30.132000 audit: CWD cwd="/" Jul 2 01:49:30.132000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:30.132000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:30.132000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 01:49:36.261000 audit: BPF prog-id=12 op=LOAD Jul 2 01:49:36.261000 audit: BPF prog-id=3 op=UNLOAD Jul 2 01:49:36.266000 audit: BPF prog-id=13 op=LOAD Jul 2 01:49:36.272000 audit: BPF prog-id=14 op=LOAD Jul 2 01:49:36.272000 audit: BPF prog-id=4 op=UNLOAD Jul 2 01:49:36.272000 audit: BPF prog-id=5 op=UNLOAD Jul 2 01:49:36.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:36.322000 audit: BPF prog-id=12 op=UNLOAD Jul 2 01:49:36.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:36.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:36.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:36.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:36.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:36.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:36.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:36.853000 audit: BPF prog-id=15 op=LOAD Jul 2 01:49:36.854000 audit: BPF prog-id=16 op=LOAD Jul 2 01:49:36.854000 audit: BPF prog-id=17 op=LOAD Jul 2 01:49:36.854000 audit: BPF prog-id=13 op=UNLOAD Jul 2 01:49:36.854000 audit: BPF prog-id=14 op=UNLOAD Jul 2 01:49:36.986000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 01:49:36.986000 audit[1205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffd8107c60 a2=4000 a3=1 items=0 ppid=1 pid=1205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:49:36.986000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 01:49:36.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:30.028975 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 01:49:36.259843 systemd[1]: Queued start job for default target multi-user.target. Jul 2 01:49:30.044974 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 01:49:36.278779 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 01:49:30.044994 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 01:49:36.283621 systemd[1]: systemd-journald.service: Consumed 2.841s CPU time. Jul 2 01:49:30.045032 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:30Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 01:49:30.045042 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:30Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 01:49:30.045075 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:30Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 01:49:30.045087 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:30Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 01:49:30.045288 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:30Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 01:49:30.045321 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 01:49:30.045333 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 01:49:30.088731 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 01:49:30.088801 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 01:49:30.088833 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 01:49:30.088848 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 01:49:30.088895 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 01:49:30.088910 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 01:49:35.292288 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:35Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:49:35.292559 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:35Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:49:35.292658 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:35Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:49:35.292827 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:35Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:49:35.292935 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:35Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 01:49:35.293002 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-07-02T01:49:35Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 01:49:37.011340 systemd[1]: Started systemd-journald.service. Jul 2 01:49:37.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.012072 systemd[1]: Mounted dev-mqueue.mount. Jul 2 01:49:37.015976 systemd[1]: Mounted media.mount. Jul 2 01:49:37.019474 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 01:49:37.023746 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 01:49:37.028146 systemd[1]: Mounted tmp.mount. Jul 2 01:49:37.032069 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 01:49:37.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.036784 systemd[1]: Finished kmod-static-nodes.service. Jul 2 01:49:37.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.041538 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 01:49:37.042078 systemd[1]: Finished modprobe@configfs.service. Jul 2 01:49:37.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.046958 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:49:37.047091 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:49:37.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.051657 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 01:49:37.051905 systemd[1]: Finished modprobe@drm.service. Jul 2 01:49:37.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.056239 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:49:37.056386 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:49:37.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.061514 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 01:49:37.061638 systemd[1]: Finished modprobe@fuse.service. Jul 2 01:49:37.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.066125 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:49:37.066291 systemd[1]: Finished modprobe@loop.service. Jul 2 01:49:37.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.070705 systemd[1]: Finished systemd-modules-load.service. Jul 2 01:49:37.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.075799 systemd[1]: Finished systemd-network-generator.service. Jul 2 01:49:37.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.081259 systemd[1]: Finished systemd-remount-fs.service. Jul 2 01:49:37.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.086138 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 01:49:37.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.091353 systemd[1]: Reached target network-pre.target. Jul 2 01:49:37.097304 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 01:49:37.102787 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 01:49:37.106715 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 01:49:37.108494 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 01:49:37.113801 systemd[1]: Starting systemd-journal-flush.service... Jul 2 01:49:37.118001 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 01:49:37.119328 systemd[1]: Starting systemd-random-seed.service... Jul 2 01:49:37.123329 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 01:49:37.124658 systemd[1]: Starting systemd-sysctl.service... Jul 2 01:49:37.129666 systemd[1]: Starting systemd-sysusers.service... Jul 2 01:49:37.134753 systemd[1]: Starting systemd-udev-settle.service... Jul 2 01:49:37.140963 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 01:49:37.145783 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 01:49:37.156394 udevadm[1219]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 2 01:49:37.160539 systemd-journald[1205]: Time spent on flushing to /var/log/journal/c31e503b94df4458a01779ec456710ff is 20.092ms for 1085 entries. Jul 2 01:49:37.160539 systemd-journald[1205]: System Journal (/var/log/journal/c31e503b94df4458a01779ec456710ff) is 8.0M, max 2.6G, 2.6G free. Jul 2 01:49:37.269978 systemd-journald[1205]: Received client request to flush runtime journal. Jul 2 01:49:37.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.210414 systemd[1]: Finished systemd-random-seed.service. Jul 2 01:49:37.215243 systemd[1]: Reached target first-boot-complete.target. Jul 2 01:49:37.225555 systemd[1]: Finished systemd-sysctl.service. Jul 2 01:49:37.271066 systemd[1]: Finished systemd-journal-flush.service. Jul 2 01:49:37.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.702437 systemd[1]: Finished systemd-sysusers.service. Jul 2 01:49:37.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:37.708180 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 01:49:38.065501 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 01:49:38.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.552519 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 01:49:38.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:38.557000 audit: BPF prog-id=18 op=LOAD Jul 2 01:49:38.557000 audit: BPF prog-id=19 op=LOAD Jul 2 01:49:38.558000 audit: BPF prog-id=7 op=UNLOAD Jul 2 01:49:38.558000 audit: BPF prog-id=8 op=UNLOAD Jul 2 01:49:38.559717 systemd[1]: Starting systemd-udevd.service... Jul 2 01:49:38.580595 systemd-udevd[1224]: Using default interface naming scheme 'v252'. Jul 2 01:49:39.037364 systemd[1]: Started systemd-udevd.service. Jul 2 01:49:39.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:39.047000 audit: BPF prog-id=20 op=LOAD Jul 2 01:49:39.049291 systemd[1]: Starting systemd-networkd.service... Jul 2 01:49:39.082123 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Jul 2 01:49:39.112000 audit: BPF prog-id=21 op=LOAD Jul 2 01:49:39.112000 audit: BPF prog-id=22 op=LOAD Jul 2 01:49:39.112000 audit: BPF prog-id=23 op=LOAD Jul 2 01:49:39.114381 systemd[1]: Starting systemd-userdbd.service... Jul 2 01:49:39.156920 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 01:49:39.155000 audit[1230]: AVC avc: denied { confidentiality } for pid=1230 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 01:49:39.172209 kernel: hv_vmbus: registering driver hv_balloon Jul 2 01:49:39.172389 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Jul 2 01:49:39.172419 kernel: hv_balloon: Memory hot add disabled on ARM64 Jul 2 01:49:39.178910 kernel: hv_vmbus: registering driver hyperv_fb Jul 2 01:49:39.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:39.179790 systemd[1]: Started systemd-userdbd.service. Jul 2 01:49:39.195189 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Jul 2 01:49:39.195265 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Jul 2 01:49:39.204114 kernel: Console: switching to colour dummy device 80x25 Jul 2 01:49:39.205900 kernel: Console: switching to colour frame buffer device 128x48 Jul 2 01:49:39.155000 audit[1230]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae9f729c0 a1=aa2c a2=ffff854d24b0 a3=aaaae9ea9010 items=12 ppid=1224 pid=1230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:49:39.155000 audit: CWD cwd="/" Jul 2 01:49:39.155000 audit: PATH item=0 name=(null) inode=5862 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:39.155000 audit: PATH item=1 name=(null) inode=10989 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:39.155000 audit: PATH item=2 name=(null) inode=10989 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:39.155000 audit: PATH item=3 name=(null) inode=10990 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:39.155000 audit: PATH item=4 name=(null) inode=10989 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:39.155000 audit: PATH item=5 name=(null) inode=10991 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:39.155000 audit: PATH item=6 name=(null) inode=10989 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:39.155000 audit: PATH item=7 name=(null) inode=10992 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:39.155000 audit: PATH item=8 name=(null) inode=10989 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:39.155000 audit: PATH item=9 name=(null) inode=10993 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:39.155000 audit: PATH item=10 name=(null) inode=10989 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:39.155000 audit: PATH item=11 name=(null) inode=10994 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:49:39.155000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 01:49:39.248369 kernel: hv_utils: Registering HyperV Utility Driver Jul 2 01:49:39.253775 kernel: hv_vmbus: registering driver hv_utils Jul 2 01:49:39.253814 kernel: hv_utils: Heartbeat IC version 3.0 Jul 2 01:49:39.253839 kernel: hv_utils: Shutdown IC version 3.2 Jul 2 01:49:39.257888 kernel: hv_utils: TimeSync IC version 4.0 Jul 2 01:49:39.642513 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1238) Jul 2 01:49:39.669842 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 01:49:39.675313 systemd[1]: Finished systemd-udev-settle.service. Jul 2 01:49:39.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:39.684787 systemd[1]: Starting lvm2-activation-early.service... Jul 2 01:49:39.796130 systemd-networkd[1245]: lo: Link UP Jul 2 01:49:39.796142 systemd-networkd[1245]: lo: Gained carrier Jul 2 01:49:39.796610 systemd-networkd[1245]: Enumeration completed Jul 2 01:49:39.796742 systemd[1]: Started systemd-networkd.service. Jul 2 01:49:39.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:39.802549 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 01:49:39.823604 systemd-networkd[1245]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 01:49:39.873505 kernel: mlx5_core 30f7:00:02.0 enP12535s1: Link up Jul 2 01:49:39.899507 kernel: hv_netvsc 002248b3-fbd9-0022-48b3-fbd9002248b3 eth0: Data path switched to VF: enP12535s1 Jul 2 01:49:39.899478 systemd-networkd[1245]: enP12535s1: Link UP Jul 2 01:49:39.899594 systemd-networkd[1245]: eth0: Link UP Jul 2 01:49:39.899598 systemd-networkd[1245]: eth0: Gained carrier Jul 2 01:49:39.909818 systemd-networkd[1245]: enP12535s1: Gained carrier Jul 2 01:49:39.927602 systemd-networkd[1245]: eth0: DHCPv4 address 10.200.20.43/24, gateway 10.200.20.1 acquired from 168.63.129.16 Jul 2 01:49:40.007642 lvm[1301]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 01:49:40.043534 systemd[1]: Finished lvm2-activation-early.service. Jul 2 01:49:40.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:40.048159 systemd[1]: Reached target cryptsetup.target. Jul 2 01:49:40.053597 systemd[1]: Starting lvm2-activation.service... Jul 2 01:49:40.061426 lvm[1303]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 01:49:40.084527 systemd[1]: Finished lvm2-activation.service. Jul 2 01:49:40.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:40.089202 systemd[1]: Reached target local-fs-pre.target. Jul 2 01:49:40.093537 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 01:49:40.093567 systemd[1]: Reached target local-fs.target. Jul 2 01:49:40.097588 systemd[1]: Reached target machines.target. Jul 2 01:49:40.103067 systemd[1]: Starting ldconfig.service... Jul 2 01:49:40.124150 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:49:40.124220 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:49:40.125532 systemd[1]: Starting systemd-boot-update.service... Jul 2 01:49:40.130604 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 01:49:40.136838 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 01:49:40.142238 systemd[1]: Starting systemd-sysext.service... Jul 2 01:49:40.177161 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1305 (bootctl) Jul 2 01:49:40.178529 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 01:49:40.199757 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 01:49:40.801396 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 01:49:40.801644 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 01:49:40.834419 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 01:49:40.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:40.846484 kernel: loop0: detected capacity change from 0 to 194096 Jul 2 01:49:40.878672 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 01:49:40.898475 kernel: loop1: detected capacity change from 0 to 194096 Jul 2 01:49:40.904768 (sd-sysext)[1318]: Using extensions 'kubernetes'. Jul 2 01:49:40.905974 (sd-sysext)[1318]: Merged extensions into '/usr'. Jul 2 01:49:40.925021 systemd[1]: Mounting usr-share-oem.mount... Jul 2 01:49:40.929233 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:49:40.930693 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:49:40.936661 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:49:40.942257 systemd[1]: Starting modprobe@loop.service... Jul 2 01:49:40.946524 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:49:40.946662 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:49:40.949083 systemd[1]: Mounted usr-share-oem.mount. Jul 2 01:49:40.954368 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:49:40.954570 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:49:40.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:40.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:40.959968 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:49:40.960292 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:49:40.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:40.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:40.966056 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:49:40.966251 systemd[1]: Finished modprobe@loop.service. Jul 2 01:49:40.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:40.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:40.973929 systemd[1]: Finished systemd-sysext.service. Jul 2 01:49:40.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:40.980011 systemd[1]: Starting ensure-sysext.service... Jul 2 01:49:40.985031 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 01:49:40.985106 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 01:49:40.986395 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 01:49:40.995597 systemd[1]: Reloading. Jul 2 01:49:41.001415 systemd-tmpfiles[1325]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 01:49:41.023017 systemd-tmpfiles[1325]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 01:49:41.040969 systemd-tmpfiles[1325]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 01:49:41.044910 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-07-02T01:49:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 01:49:41.045261 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-07-02T01:49:41Z" level=info msg="torcx already run" Jul 2 01:49:41.056066 systemd-fsck[1315]: fsck.fat 4.2 (2021-01-31) Jul 2 01:49:41.056066 systemd-fsck[1315]: /dev/sda1: 236 files, 117047/258078 clusters Jul 2 01:49:41.164796 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 01:49:41.164817 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 01:49:41.181172 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 01:49:41.244132 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 01:49:41.246000 audit: BPF prog-id=24 op=LOAD Jul 2 01:49:41.246000 audit: BPF prog-id=21 op=UNLOAD Jul 2 01:49:41.246000 audit: BPF prog-id=25 op=LOAD Jul 2 01:49:41.246000 audit: BPF prog-id=26 op=LOAD Jul 2 01:49:41.246000 audit: BPF prog-id=22 op=UNLOAD Jul 2 01:49:41.246000 audit: BPF prog-id=23 op=UNLOAD Jul 2 01:49:41.247000 audit: BPF prog-id=27 op=LOAD Jul 2 01:49:41.247000 audit: BPF prog-id=15 op=UNLOAD Jul 2 01:49:41.247000 audit: BPF prog-id=28 op=LOAD Jul 2 01:49:41.247000 audit: BPF prog-id=29 op=LOAD Jul 2 01:49:41.247000 audit: BPF prog-id=16 op=UNLOAD Jul 2 01:49:41.247000 audit: BPF prog-id=17 op=UNLOAD Jul 2 01:49:41.249000 audit: BPF prog-id=30 op=LOAD Jul 2 01:49:41.249000 audit: BPF prog-id=31 op=LOAD Jul 2 01:49:41.249000 audit: BPF prog-id=18 op=UNLOAD Jul 2 01:49:41.249000 audit: BPF prog-id=19 op=UNLOAD Jul 2 01:49:41.250000 audit: BPF prog-id=32 op=LOAD Jul 2 01:49:41.250000 audit: BPF prog-id=20 op=UNLOAD Jul 2 01:49:41.255247 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 01:49:41.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.260885 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 01:49:41.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.273119 systemd[1]: Mounting boot.mount... Jul 2 01:49:41.285442 systemd[1]: Finished ensure-sysext.service. Jul 2 01:49:41.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.291380 systemd[1]: Mounted boot.mount. Jul 2 01:49:41.296304 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:49:41.297814 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:49:41.303382 systemd[1]: Starting modprobe@drm.service... Jul 2 01:49:41.308131 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:49:41.313191 systemd-networkd[1245]: eth0: Gained IPv6LL Jul 2 01:49:41.316390 systemd[1]: Starting modprobe@loop.service... Jul 2 01:49:41.321408 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:49:41.322063 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:49:41.322908 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:49:41.323075 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:49:41.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.328049 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 01:49:41.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.333981 systemd[1]: Finished systemd-boot-update.service. Jul 2 01:49:41.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.339975 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 01:49:41.340117 systemd[1]: Finished modprobe@drm.service. Jul 2 01:49:41.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.344794 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:49:41.344922 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:49:41.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.350275 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:49:41.350405 systemd[1]: Finished modprobe@loop.service. Jul 2 01:49:41.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.356619 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 01:49:41.356675 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 01:49:41.543554 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 01:49:41.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.550188 systemd[1]: Starting audit-rules.service... Jul 2 01:49:41.553289 kernel: kauditd_printk_skb: 108 callbacks suppressed Jul 2 01:49:41.553359 kernel: audit: type=1130 audit(1719884981.548:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.575424 systemd[1]: Starting clean-ca-certificates.service... Jul 2 01:49:41.581826 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 01:49:41.589309 systemd[1]: Starting systemd-resolved.service... Jul 2 01:49:41.587000 audit: BPF prog-id=33 op=LOAD Jul 2 01:49:41.602364 systemd[1]: Starting systemd-timesyncd.service... Jul 2 01:49:41.612890 kernel: audit: type=1334 audit(1719884981.587:192): prog-id=33 op=LOAD Jul 2 01:49:41.612999 kernel: audit: type=1334 audit(1719884981.600:193): prog-id=34 op=LOAD Jul 2 01:49:41.600000 audit: BPF prog-id=34 op=LOAD Jul 2 01:49:41.614264 systemd[1]: Starting systemd-update-utmp.service... Jul 2 01:49:41.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.640035 systemd[1]: Finished clean-ca-certificates.service. Jul 2 01:49:41.661417 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 01:49:41.662522 kernel: audit: type=1130 audit(1719884981.644:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.669000 audit[1419]: SYSTEM_BOOT pid=1419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.694854 kernel: audit: type=1127 audit(1719884981.669:195): pid=1419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.689922 systemd[1]: Finished systemd-update-utmp.service. Jul 2 01:49:41.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.713549 kernel: audit: type=1130 audit(1719884981.695:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.749714 systemd[1]: Started systemd-timesyncd.service. Jul 2 01:49:41.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.754872 systemd[1]: Reached target time-set.target. Jul 2 01:49:41.776481 kernel: audit: type=1130 audit(1719884981.754:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.782087 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 01:49:41.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.807608 kernel: audit: type=1130 audit(1719884981.787:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.837954 systemd-resolved[1417]: Positive Trust Anchors: Jul 2 01:49:41.837968 systemd-resolved[1417]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 01:49:41.837996 systemd-resolved[1417]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 01:49:41.841242 systemd-resolved[1417]: Using system hostname 'ci-3510.3.5-a-118aa0dcdb'. Jul 2 01:49:41.842668 systemd[1]: Started systemd-resolved.service. Jul 2 01:49:41.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.862892 systemd[1]: Reached target network.target. Jul 2 01:49:41.868176 kernel: audit: type=1130 audit(1719884981.846:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:49:41.868869 systemd[1]: Reached target network-online.target. Jul 2 01:49:41.873610 systemd[1]: Reached target nss-lookup.target. Jul 2 01:49:42.031000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 01:49:42.031000 audit[1434]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffeed49f0 a2=420 a3=0 items=0 ppid=1413 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:49:42.031000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 01:49:42.044534 kernel: audit: type=1305 audit(1719884982.031:200): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 01:49:42.045441 augenrules[1434]: No rules Jul 2 01:49:42.046599 systemd[1]: Finished audit-rules.service. Jul 2 01:49:42.173553 systemd-timesyncd[1418]: Contacted time server 72.30.35.88:123 (0.flatcar.pool.ntp.org). Jul 2 01:49:42.173618 systemd-timesyncd[1418]: Initial clock synchronization to Tue 2024-07-02 01:49:42.152520 UTC. Jul 2 01:49:48.718970 ldconfig[1304]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 01:49:48.730087 systemd[1]: Finished ldconfig.service. Jul 2 01:49:48.736730 systemd[1]: Starting systemd-update-done.service... Jul 2 01:49:48.758816 systemd[1]: Finished systemd-update-done.service. Jul 2 01:49:48.763822 systemd[1]: Reached target sysinit.target. Jul 2 01:49:48.768986 systemd[1]: Started motdgen.path. Jul 2 01:49:48.773028 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 01:49:48.779499 systemd[1]: Started logrotate.timer. Jul 2 01:49:48.783841 systemd[1]: Started mdadm.timer. Jul 2 01:49:48.787534 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 01:49:48.792169 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 01:49:48.792307 systemd[1]: Reached target paths.target. Jul 2 01:49:48.796435 systemd[1]: Reached target timers.target. Jul 2 01:49:48.801756 systemd[1]: Listening on dbus.socket. Jul 2 01:49:48.807104 systemd[1]: Starting docker.socket... Jul 2 01:49:48.813311 systemd[1]: Listening on sshd.socket. Jul 2 01:49:48.817505 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:49:48.818178 systemd[1]: Listening on docker.socket. Jul 2 01:49:48.822343 systemd[1]: Reached target sockets.target. Jul 2 01:49:48.826623 systemd[1]: Reached target basic.target. Jul 2 01:49:48.831559 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 01:49:48.831719 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 01:49:48.833181 systemd[1]: Starting containerd.service... Jul 2 01:49:48.838407 systemd[1]: Starting dbus.service... Jul 2 01:49:48.843722 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 01:49:48.849815 systemd[1]: Starting extend-filesystems.service... Jul 2 01:49:48.853937 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 01:49:48.868189 systemd[1]: Starting kubelet.service... Jul 2 01:49:48.872986 systemd[1]: Starting motdgen.service... Jul 2 01:49:48.878392 systemd[1]: Started nvidia.service. Jul 2 01:49:48.884374 systemd[1]: Starting prepare-helm.service... Jul 2 01:49:48.889606 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 01:49:48.895200 systemd[1]: Starting sshd-keygen.service... Jul 2 01:49:48.901260 systemd[1]: Starting systemd-logind.service... Jul 2 01:49:48.906185 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:49:48.906265 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 01:49:48.906760 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 01:49:48.908336 systemd[1]: Starting update-engine.service... Jul 2 01:49:48.913350 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 01:49:48.924926 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 01:49:48.926981 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 01:49:48.940709 jq[1461]: true Jul 2 01:49:48.941006 jq[1444]: false Jul 2 01:49:48.956498 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 01:49:48.956693 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 01:49:48.970244 extend-filesystems[1445]: Found loop1 Jul 2 01:49:48.970244 extend-filesystems[1445]: Found sda Jul 2 01:49:48.970244 extend-filesystems[1445]: Found sda1 Jul 2 01:49:48.970244 extend-filesystems[1445]: Found sda2 Jul 2 01:49:48.987263 extend-filesystems[1445]: Found sda3 Jul 2 01:49:48.987263 extend-filesystems[1445]: Found usr Jul 2 01:49:48.987263 extend-filesystems[1445]: Found sda4 Jul 2 01:49:48.987263 extend-filesystems[1445]: Found sda6 Jul 2 01:49:48.987263 extend-filesystems[1445]: Found sda7 Jul 2 01:49:48.987263 extend-filesystems[1445]: Found sda9 Jul 2 01:49:48.987263 extend-filesystems[1445]: Checking size of /dev/sda9 Jul 2 01:49:49.041252 jq[1467]: true Jul 2 01:49:49.005763 systemd-logind[1455]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 01:49:49.009661 systemd-logind[1455]: New seat seat0. Jul 2 01:49:49.036116 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 01:49:49.036283 systemd[1]: Finished motdgen.service. Jul 2 01:49:49.069010 extend-filesystems[1445]: Old size kept for /dev/sda9 Jul 2 01:49:49.086701 extend-filesystems[1445]: Found sr0 Jul 2 01:49:49.075984 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 01:49:49.100240 tar[1465]: linux-arm64/helm Jul 2 01:49:49.076143 systemd[1]: Finished extend-filesystems.service. Jul 2 01:49:49.168390 env[1471]: time="2024-07-02T01:49:49.168329835Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 01:49:49.188639 bash[1495]: Updated "/home/core/.ssh/authorized_keys" Jul 2 01:49:49.189390 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 01:49:49.233682 dbus-daemon[1443]: [system] SELinux support is enabled Jul 2 01:49:49.233891 systemd[1]: Started dbus.service. Jul 2 01:49:49.239727 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 01:49:49.239751 systemd[1]: Reached target system-config.target. Jul 2 01:49:49.246859 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 01:49:49.246885 systemd[1]: Reached target user-config.target. Jul 2 01:49:49.254992 systemd[1]: Started systemd-logind.service. Jul 2 01:49:49.280083 env[1471]: time="2024-07-02T01:49:49.280031220Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 01:49:49.280215 env[1471]: time="2024-07-02T01:49:49.280193636Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:49:49.290092 systemd[1]: nvidia.service: Deactivated successfully. Jul 2 01:49:49.290863 env[1471]: time="2024-07-02T01:49:49.290809327Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 01:49:49.290863 env[1471]: time="2024-07-02T01:49:49.290856685Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:49:49.291355 env[1471]: time="2024-07-02T01:49:49.291283586Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 01:49:49.291355 env[1471]: time="2024-07-02T01:49:49.291349208Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 01:49:49.291430 env[1471]: time="2024-07-02T01:49:49.291363755Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 01:49:49.291430 env[1471]: time="2024-07-02T01:49:49.291373866Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 01:49:49.291565 env[1471]: time="2024-07-02T01:49:49.291541597Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:49:49.293085 env[1471]: time="2024-07-02T01:49:49.293006616Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:49:49.294126 env[1471]: time="2024-07-02T01:49:49.294090413Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 01:49:49.294126 env[1471]: time="2024-07-02T01:49:49.294121425Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 01:49:49.294337 env[1471]: time="2024-07-02T01:49:49.294311536Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 01:49:49.294337 env[1471]: time="2024-07-02T01:49:49.294333277Z" level=info msg="metadata content store policy set" policy=shared Jul 2 01:49:49.314477 env[1471]: time="2024-07-02T01:49:49.313354822Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 01:49:49.314477 env[1471]: time="2024-07-02T01:49:49.313401580Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 01:49:49.314477 env[1471]: time="2024-07-02T01:49:49.313415248Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 01:49:49.314477 env[1471]: time="2024-07-02T01:49:49.313487864Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 01:49:49.314477 env[1471]: time="2024-07-02T01:49:49.313508366Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 01:49:49.314477 env[1471]: time="2024-07-02T01:49:49.313521874Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 01:49:49.314477 env[1471]: time="2024-07-02T01:49:49.313534023Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 01:49:49.314477 env[1471]: time="2024-07-02T01:49:49.313872402Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 01:49:49.314477 env[1471]: time="2024-07-02T01:49:49.313888548Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 01:49:49.314477 env[1471]: time="2024-07-02T01:49:49.313901217Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 01:49:49.314477 env[1471]: time="2024-07-02T01:49:49.313913406Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 01:49:49.314477 env[1471]: time="2024-07-02T01:49:49.313926714Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 01:49:49.314477 env[1471]: time="2024-07-02T01:49:49.314069108Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 01:49:49.314477 env[1471]: time="2024-07-02T01:49:49.314157589Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 01:49:49.314831 env[1471]: time="2024-07-02T01:49:49.314388704Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 01:49:49.314831 env[1471]: time="2024-07-02T01:49:49.314413162Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 01:49:49.314831 env[1471]: time="2024-07-02T01:49:49.314426550Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 01:49:49.314958 env[1471]: time="2024-07-02T01:49:49.314938615Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 01:49:49.315027 env[1471]: time="2024-07-02T01:49:49.315013549Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 01:49:49.315110 env[1471]: time="2024-07-02T01:49:49.315069179Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 01:49:49.315207 env[1471]: time="2024-07-02T01:49:49.315191191Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 01:49:49.315280 env[1471]: time="2024-07-02T01:49:49.315263007Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 01:49:49.315334 env[1471]: time="2024-07-02T01:49:49.315322434Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 01:49:49.315387 env[1471]: time="2024-07-02T01:49:49.315374748Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 01:49:49.315469 env[1471]: time="2024-07-02T01:49:49.315442847Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 01:49:49.315592 env[1471]: time="2024-07-02T01:49:49.315577168Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 01:49:49.315800 env[1471]: time="2024-07-02T01:49:49.315783225Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 01:49:49.315907 env[1471]: time="2024-07-02T01:49:49.315892688Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 01:49:49.315971 env[1471]: time="2024-07-02T01:49:49.315959468Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 01:49:49.316023 env[1471]: time="2024-07-02T01:49:49.316011462Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 01:49:49.316081 env[1471]: time="2024-07-02T01:49:49.316067732Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 01:49:49.316130 env[1471]: time="2024-07-02T01:49:49.316119087Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 01:49:49.316189 env[1471]: time="2024-07-02T01:49:49.316175996Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 01:49:49.316268 env[1471]: time="2024-07-02T01:49:49.316254806Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 01:49:49.316560 env[1471]: time="2024-07-02T01:49:49.316509980Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 01:49:49.333973 env[1471]: time="2024-07-02T01:49:49.316768150Z" level=info msg="Connect containerd service" Jul 2 01:49:49.333973 env[1471]: time="2024-07-02T01:49:49.316845362Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 01:49:49.333973 env[1471]: time="2024-07-02T01:49:49.317430242Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 01:49:49.333973 env[1471]: time="2024-07-02T01:49:49.318200478Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 01:49:49.333973 env[1471]: time="2024-07-02T01:49:49.318240403Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 01:49:49.333973 env[1471]: time="2024-07-02T01:49:49.322613878Z" level=info msg="Start subscribing containerd event" Jul 2 01:49:49.333973 env[1471]: time="2024-07-02T01:49:49.322741445Z" level=info msg="Start recovering state" Jul 2 01:49:49.333973 env[1471]: time="2024-07-02T01:49:49.322827169Z" level=info msg="Start event monitor" Jul 2 01:49:49.333973 env[1471]: time="2024-07-02T01:49:49.322848669Z" level=info msg="Start snapshots syncer" Jul 2 01:49:49.333973 env[1471]: time="2024-07-02T01:49:49.322860779Z" level=info msg="Start cni network conf syncer for default" Jul 2 01:49:49.333973 env[1471]: time="2024-07-02T01:49:49.322868971Z" level=info msg="Start streaming server" Jul 2 01:49:49.318346 systemd[1]: Started containerd.service. Jul 2 01:49:49.340282 env[1471]: time="2024-07-02T01:49:49.339622491Z" level=info msg="containerd successfully booted in 0.198172s" Jul 2 01:49:49.643141 update_engine[1459]: I0702 01:49:49.629057 1459 main.cc:92] Flatcar Update Engine starting Jul 2 01:49:49.651344 tar[1465]: linux-arm64/LICENSE Jul 2 01:49:49.651563 tar[1465]: linux-arm64/README.md Jul 2 01:49:49.656760 systemd[1]: Finished prepare-helm.service. Jul 2 01:49:49.677994 systemd[1]: Started update-engine.service. Jul 2 01:49:49.682709 update_engine[1459]: I0702 01:49:49.678035 1459 update_check_scheduler.cc:74] Next update check in 10m42s Jul 2 01:49:49.685017 systemd[1]: Started locksmithd.service. Jul 2 01:49:49.959138 systemd[1]: Started kubelet.service. Jul 2 01:49:50.520013 kubelet[1552]: E0702 01:49:50.519968 1552 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:49:50.522108 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:49:50.522243 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:49:50.667924 sshd_keygen[1463]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 01:49:50.687035 systemd[1]: Finished sshd-keygen.service. Jul 2 01:49:50.692827 systemd[1]: Starting issuegen.service... Jul 2 01:49:50.697843 systemd[1]: Started waagent.service. Jul 2 01:49:50.707085 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 01:49:50.707267 systemd[1]: Finished issuegen.service. Jul 2 01:49:50.713880 systemd[1]: Starting systemd-user-sessions.service... Jul 2 01:49:50.748152 systemd[1]: Finished systemd-user-sessions.service. Jul 2 01:49:50.755952 systemd[1]: Started getty@tty1.service. Jul 2 01:49:50.762328 systemd[1]: Started serial-getty@ttyAMA0.service. Jul 2 01:49:50.767442 systemd[1]: Reached target getty.target. Jul 2 01:49:50.771914 systemd[1]: Reached target multi-user.target. Jul 2 01:49:50.778152 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 01:49:50.790084 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 01:49:50.790267 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 01:49:50.795805 systemd[1]: Startup finished in 733ms (kernel) + 13.041s (initrd) + 23.005s (userspace) = 36.781s. Jul 2 01:49:51.186497 locksmithd[1549]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 01:49:51.397711 login[1575]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Jul 2 01:49:51.412719 login[1574]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 01:49:51.452425 systemd[1]: Created slice user-500.slice. Jul 2 01:49:51.453729 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 01:49:51.456252 systemd-logind[1455]: New session 2 of user core. Jul 2 01:49:51.478028 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 01:49:51.479800 systemd[1]: Starting user@500.service... Jul 2 01:49:51.515493 (systemd)[1579]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:49:51.789859 systemd[1579]: Queued start job for default target default.target. Jul 2 01:49:51.790413 systemd[1579]: Reached target paths.target. Jul 2 01:49:51.790434 systemd[1579]: Reached target sockets.target. Jul 2 01:49:51.790445 systemd[1579]: Reached target timers.target. Jul 2 01:49:51.790486 systemd[1579]: Reached target basic.target. Jul 2 01:49:51.790597 systemd[1]: Started user@500.service. Jul 2 01:49:51.791534 systemd[1]: Started session-2.scope. Jul 2 01:49:51.792010 systemd[1579]: Reached target default.target. Jul 2 01:49:51.792184 systemd[1579]: Startup finished in 270ms. Jul 2 01:49:52.399196 login[1575]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 01:49:52.403219 systemd-logind[1455]: New session 1 of user core. Jul 2 01:49:52.404049 systemd[1]: Started session-1.scope. Jul 2 01:49:57.880578 waagent[1569]: 2024-07-02T01:49:57.880410Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Jul 2 01:49:57.886997 waagent[1569]: 2024-07-02T01:49:57.886875Z INFO Daemon Daemon OS: flatcar 3510.3.5 Jul 2 01:49:57.891517 waagent[1569]: 2024-07-02T01:49:57.891405Z INFO Daemon Daemon Python: 3.9.16 Jul 2 01:49:57.896723 waagent[1569]: 2024-07-02T01:49:57.896616Z INFO Daemon Daemon Run daemon Jul 2 01:49:57.901759 waagent[1569]: 2024-07-02T01:49:57.901666Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.5' Jul 2 01:49:57.919634 waagent[1569]: 2024-07-02T01:49:57.919416Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Jul 2 01:49:57.935537 waagent[1569]: 2024-07-02T01:49:57.935341Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Jul 2 01:49:57.946093 waagent[1569]: 2024-07-02T01:49:57.945987Z INFO Daemon Daemon cloud-init is enabled: False Jul 2 01:49:57.951405 waagent[1569]: 2024-07-02T01:49:57.951302Z INFO Daemon Daemon Using waagent for provisioning Jul 2 01:49:57.958047 waagent[1569]: 2024-07-02T01:49:57.957956Z INFO Daemon Daemon Activate resource disk Jul 2 01:49:57.963028 waagent[1569]: 2024-07-02T01:49:57.962933Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Jul 2 01:49:57.978725 waagent[1569]: 2024-07-02T01:49:57.978621Z INFO Daemon Daemon Found device: None Jul 2 01:49:57.983511 waagent[1569]: 2024-07-02T01:49:57.983368Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Jul 2 01:49:57.992028 waagent[1569]: 2024-07-02T01:49:57.991931Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Jul 2 01:49:58.004381 waagent[1569]: 2024-07-02T01:49:58.004288Z INFO Daemon Daemon Clean protocol and wireserver endpoint Jul 2 01:49:58.010726 waagent[1569]: 2024-07-02T01:49:58.010631Z INFO Daemon Daemon Running default provisioning handler Jul 2 01:49:58.025055 waagent[1569]: 2024-07-02T01:49:58.024862Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Jul 2 01:49:58.040388 waagent[1569]: 2024-07-02T01:49:58.040202Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Jul 2 01:49:58.049895 waagent[1569]: 2024-07-02T01:49:58.049779Z INFO Daemon Daemon cloud-init is enabled: False Jul 2 01:49:58.055491 waagent[1569]: 2024-07-02T01:49:58.055345Z INFO Daemon Daemon Copying ovf-env.xml Jul 2 01:49:58.120875 waagent[1569]: 2024-07-02T01:49:58.115311Z INFO Daemon Daemon Successfully mounted dvd Jul 2 01:49:58.180609 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Jul 2 01:49:58.218175 waagent[1569]: 2024-07-02T01:49:58.218026Z INFO Daemon Daemon Detect protocol endpoint Jul 2 01:49:58.223396 waagent[1569]: 2024-07-02T01:49:58.223291Z INFO Daemon Daemon Clean protocol and wireserver endpoint Jul 2 01:49:58.229590 waagent[1569]: 2024-07-02T01:49:58.229492Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Jul 2 01:49:58.236846 waagent[1569]: 2024-07-02T01:49:58.236750Z INFO Daemon Daemon Test for route to 168.63.129.16 Jul 2 01:49:58.242654 waagent[1569]: 2024-07-02T01:49:58.242562Z INFO Daemon Daemon Route to 168.63.129.16 exists Jul 2 01:49:58.248032 waagent[1569]: 2024-07-02T01:49:58.247936Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Jul 2 01:49:58.401317 waagent[1569]: 2024-07-02T01:49:58.401246Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Jul 2 01:49:58.408976 waagent[1569]: 2024-07-02T01:49:58.408922Z INFO Daemon Daemon Wire protocol version:2012-11-30 Jul 2 01:49:58.414850 waagent[1569]: 2024-07-02T01:49:58.414756Z INFO Daemon Daemon Server preferred version:2015-04-05 Jul 2 01:49:59.496664 waagent[1569]: 2024-07-02T01:49:59.496515Z INFO Daemon Daemon Initializing goal state during protocol detection Jul 2 01:49:59.512546 waagent[1569]: 2024-07-02T01:49:59.512447Z INFO Daemon Daemon Forcing an update of the goal state.. Jul 2 01:49:59.518240 waagent[1569]: 2024-07-02T01:49:59.518156Z INFO Daemon Daemon Fetching goal state [incarnation 1] Jul 2 01:49:59.601793 waagent[1569]: 2024-07-02T01:49:59.601661Z INFO Daemon Daemon Found private key matching thumbprint 7BB49B77886E69ECFE71A87ABD537418BE933108 Jul 2 01:49:59.609956 waagent[1569]: 2024-07-02T01:49:59.609863Z INFO Daemon Daemon Certificate with thumbprint 218C59AA1F56444B351E890F93F894D26A31FAE3 has no matching private key. Jul 2 01:49:59.619908 waagent[1569]: 2024-07-02T01:49:59.619816Z INFO Daemon Daemon Fetch goal state completed Jul 2 01:49:59.670782 waagent[1569]: 2024-07-02T01:49:59.670720Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 56439679-0be6-4514-851e-ae139cd7cb89 New eTag: 7048145121712233370] Jul 2 01:49:59.682078 waagent[1569]: 2024-07-02T01:49:59.681991Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Jul 2 01:49:59.703875 waagent[1569]: 2024-07-02T01:49:59.703811Z INFO Daemon Daemon Starting provisioning Jul 2 01:49:59.708955 waagent[1569]: 2024-07-02T01:49:59.708868Z INFO Daemon Daemon Handle ovf-env.xml. Jul 2 01:49:59.713805 waagent[1569]: 2024-07-02T01:49:59.713724Z INFO Daemon Daemon Set hostname [ci-3510.3.5-a-118aa0dcdb] Jul 2 01:49:59.807434 waagent[1569]: 2024-07-02T01:49:59.807302Z INFO Daemon Daemon Publish hostname [ci-3510.3.5-a-118aa0dcdb] Jul 2 01:49:59.813804 waagent[1569]: 2024-07-02T01:49:59.813706Z INFO Daemon Daemon Examine /proc/net/route for primary interface Jul 2 01:49:59.820218 waagent[1569]: 2024-07-02T01:49:59.820132Z INFO Daemon Daemon Primary interface is [eth0] Jul 2 01:49:59.839110 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Jul 2 01:49:59.839287 systemd[1]: Stopped systemd-networkd-wait-online.service. Jul 2 01:49:59.839365 systemd[1]: Stopping systemd-networkd-wait-online.service... Jul 2 01:49:59.839843 systemd[1]: Stopping systemd-networkd.service... Jul 2 01:49:59.844555 systemd-networkd[1245]: eth0: DHCPv6 lease lost Jul 2 01:49:59.846970 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 01:49:59.847165 systemd[1]: Stopped systemd-networkd.service. Jul 2 01:49:59.849598 systemd[1]: Starting systemd-networkd.service... Jul 2 01:49:59.879618 systemd-networkd[1624]: enP12535s1: Link UP Jul 2 01:49:59.879904 systemd-networkd[1624]: enP12535s1: Gained carrier Jul 2 01:49:59.880925 systemd-networkd[1624]: eth0: Link UP Jul 2 01:49:59.881019 systemd-networkd[1624]: eth0: Gained carrier Jul 2 01:49:59.881469 systemd-networkd[1624]: lo: Link UP Jul 2 01:49:59.881572 systemd-networkd[1624]: lo: Gained carrier Jul 2 01:49:59.881880 systemd-networkd[1624]: eth0: Gained IPv6LL Jul 2 01:49:59.882174 systemd-networkd[1624]: Enumeration completed Jul 2 01:49:59.882921 systemd-networkd[1624]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 01:49:59.883170 systemd[1]: Started systemd-networkd.service. Jul 2 01:49:59.885137 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 01:49:59.887239 waagent[1569]: 2024-07-02T01:49:59.887020Z INFO Daemon Daemon Create user account if not exists Jul 2 01:49:59.894319 waagent[1569]: 2024-07-02T01:49:59.893267Z INFO Daemon Daemon User core already exists, skip useradd Jul 2 01:49:59.900716 waagent[1569]: 2024-07-02T01:49:59.900616Z INFO Daemon Daemon Configure sudoer Jul 2 01:49:59.906086 waagent[1569]: 2024-07-02T01:49:59.905993Z INFO Daemon Daemon Configure sshd Jul 2 01:49:59.910471 waagent[1569]: 2024-07-02T01:49:59.910356Z INFO Daemon Daemon Deploy ssh public key. Jul 2 01:49:59.915571 systemd-networkd[1624]: eth0: DHCPv4 address 10.200.20.43/24, gateway 10.200.20.1 acquired from 168.63.129.16 Jul 2 01:49:59.918570 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 01:50:00.575439 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 01:50:00.575665 systemd[1]: Stopped kubelet.service. Jul 2 01:50:00.577222 systemd[1]: Starting kubelet.service... Jul 2 01:50:00.659252 systemd[1]: Started kubelet.service. Jul 2 01:50:01.205944 waagent[1569]: 2024-07-02T01:50:01.200923Z INFO Daemon Daemon Provisioning complete Jul 2 01:50:01.223254 waagent[1569]: 2024-07-02T01:50:01.223161Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Jul 2 01:50:01.229807 waagent[1569]: 2024-07-02T01:50:01.229706Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Jul 2 01:50:01.240401 waagent[1569]: 2024-07-02T01:50:01.240291Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Jul 2 01:50:01.258215 kubelet[1637]: E0702 01:50:01.258174 1637 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:50:01.260896 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:50:01.261040 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:50:01.572777 waagent[1643]: 2024-07-02T01:50:01.572618Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Jul 2 01:50:01.573984 waagent[1643]: 2024-07-02T01:50:01.573916Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:50:01.574262 waagent[1643]: 2024-07-02T01:50:01.574211Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:50:01.587610 waagent[1643]: 2024-07-02T01:50:01.587506Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Jul 2 01:50:01.587987 waagent[1643]: 2024-07-02T01:50:01.587933Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Jul 2 01:50:01.663884 waagent[1643]: 2024-07-02T01:50:01.663737Z INFO ExtHandler ExtHandler Found private key matching thumbprint 7BB49B77886E69ECFE71A87ABD537418BE933108 Jul 2 01:50:01.664308 waagent[1643]: 2024-07-02T01:50:01.664251Z INFO ExtHandler ExtHandler Certificate with thumbprint 218C59AA1F56444B351E890F93F894D26A31FAE3 has no matching private key. Jul 2 01:50:01.664745 waagent[1643]: 2024-07-02T01:50:01.664637Z INFO ExtHandler ExtHandler Fetch goal state completed Jul 2 01:50:01.680934 waagent[1643]: 2024-07-02T01:50:01.680867Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 37245023-fc34-4004-a682-2935b67de3ce New eTag: 7048145121712233370] Jul 2 01:50:01.681829 waagent[1643]: 2024-07-02T01:50:01.681754Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Jul 2 01:50:01.758185 waagent[1643]: 2024-07-02T01:50:01.758034Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.5; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Jul 2 01:50:01.782791 waagent[1643]: 2024-07-02T01:50:01.782666Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1643 Jul 2 01:50:01.787197 waagent[1643]: 2024-07-02T01:50:01.787103Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.5', '', 'Flatcar Container Linux by Kinvolk'] Jul 2 01:50:01.788758 waagent[1643]: 2024-07-02T01:50:01.788680Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Jul 2 01:50:01.903082 waagent[1643]: 2024-07-02T01:50:01.903011Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Jul 2 01:50:01.903617 waagent[1643]: 2024-07-02T01:50:01.903553Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Jul 2 01:50:01.912418 waagent[1643]: 2024-07-02T01:50:01.912346Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Jul 2 01:50:01.913372 waagent[1643]: 2024-07-02T01:50:01.913293Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Jul 2 01:50:01.914900 waagent[1643]: 2024-07-02T01:50:01.914822Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Jul 2 01:50:01.916729 waagent[1643]: 2024-07-02T01:50:01.916655Z INFO ExtHandler ExtHandler Starting env monitor service. Jul 2 01:50:01.917284 waagent[1643]: 2024-07-02T01:50:01.917207Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:50:01.917473 waagent[1643]: 2024-07-02T01:50:01.917404Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:50:01.918128 waagent[1643]: 2024-07-02T01:50:01.918062Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Jul 2 01:50:01.918690 waagent[1643]: 2024-07-02T01:50:01.918625Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Jul 2 01:50:01.919555 waagent[1643]: 2024-07-02T01:50:01.919427Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Jul 2 01:50:01.919555 waagent[1643]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Jul 2 01:50:01.919555 waagent[1643]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Jul 2 01:50:01.919555 waagent[1643]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Jul 2 01:50:01.919555 waagent[1643]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:50:01.919555 waagent[1643]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:50:01.919555 waagent[1643]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:50:01.919902 waagent[1643]: 2024-07-02T01:50:01.919820Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:50:01.920288 waagent[1643]: 2024-07-02T01:50:01.920219Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:50:01.920966 waagent[1643]: 2024-07-02T01:50:01.920890Z INFO EnvHandler ExtHandler Configure routes Jul 2 01:50:01.921488 waagent[1643]: 2024-07-02T01:50:01.921398Z INFO EnvHandler ExtHandler Gateway:None Jul 2 01:50:01.923511 waagent[1643]: 2024-07-02T01:50:01.923311Z INFO EnvHandler ExtHandler Routes:None Jul 2 01:50:01.923805 waagent[1643]: 2024-07-02T01:50:01.923714Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Jul 2 01:50:01.924065 waagent[1643]: 2024-07-02T01:50:01.923981Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Jul 2 01:50:01.926721 waagent[1643]: 2024-07-02T01:50:01.926626Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Jul 2 01:50:01.926978 waagent[1643]: 2024-07-02T01:50:01.926884Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Jul 2 01:50:01.927493 waagent[1643]: 2024-07-02T01:50:01.927384Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Jul 2 01:50:01.939483 waagent[1643]: 2024-07-02T01:50:01.939365Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Jul 2 01:50:01.941212 waagent[1643]: 2024-07-02T01:50:01.941124Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Jul 2 01:50:01.943580 waagent[1643]: 2024-07-02T01:50:01.943490Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Jul 2 01:50:01.989909 waagent[1643]: 2024-07-02T01:50:01.989741Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Jul 2 01:50:02.000203 waagent[1643]: 2024-07-02T01:50:02.000109Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1624' Jul 2 01:50:02.100820 waagent[1643]: 2024-07-02T01:50:02.100675Z INFO MonitorHandler ExtHandler Network interfaces: Jul 2 01:50:02.100820 waagent[1643]: Executing ['ip', '-a', '-o', 'link']: Jul 2 01:50:02.100820 waagent[1643]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Jul 2 01:50:02.100820 waagent[1643]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b3:fb:d9 brd ff:ff:ff:ff:ff:ff Jul 2 01:50:02.100820 waagent[1643]: 3: enP12535s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b3:fb:d9 brd ff:ff:ff:ff:ff:ff\ altname enP12535p0s2 Jul 2 01:50:02.100820 waagent[1643]: Executing ['ip', '-4', '-a', '-o', 'address']: Jul 2 01:50:02.100820 waagent[1643]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Jul 2 01:50:02.100820 waagent[1643]: 2: eth0 inet 10.200.20.43/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Jul 2 01:50:02.100820 waagent[1643]: Executing ['ip', '-6', '-a', '-o', 'address']: Jul 2 01:50:02.100820 waagent[1643]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Jul 2 01:50:02.100820 waagent[1643]: 2: eth0 inet6 fe80::222:48ff:feb3:fbd9/64 scope link \ valid_lft forever preferred_lft forever Jul 2 01:50:02.265602 waagent[1643]: 2024-07-02T01:50:02.265475Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.11.1.4 -- exiting Jul 2 01:50:03.244939 waagent[1569]: 2024-07-02T01:50:03.244800Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Jul 2 01:50:03.249842 waagent[1569]: 2024-07-02T01:50:03.249781Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.11.1.4 to be the latest agent Jul 2 01:50:04.474283 waagent[1674]: 2024-07-02T01:50:04.474185Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.11.1.4) Jul 2 01:50:04.475384 waagent[1674]: 2024-07-02T01:50:04.475323Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.5 Jul 2 01:50:04.475645 waagent[1674]: 2024-07-02T01:50:04.475594Z INFO ExtHandler ExtHandler Python: 3.9.16 Jul 2 01:50:04.475873 waagent[1674]: 2024-07-02T01:50:04.475826Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Jul 2 01:50:04.485525 waagent[1674]: 2024-07-02T01:50:04.485352Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.5; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Jul 2 01:50:04.486128 waagent[1674]: 2024-07-02T01:50:04.486072Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:50:04.486371 waagent[1674]: 2024-07-02T01:50:04.486325Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:50:04.500161 waagent[1674]: 2024-07-02T01:50:04.500075Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Jul 2 01:50:04.516197 waagent[1674]: 2024-07-02T01:50:04.516132Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.151 Jul 2 01:50:04.517497 waagent[1674]: 2024-07-02T01:50:04.517412Z INFO ExtHandler Jul 2 01:50:04.517774 waagent[1674]: 2024-07-02T01:50:04.517723Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 4383a502-7de1-4f62-8bc5-7606c6236bfa eTag: 7048145121712233370 source: Fabric] Jul 2 01:50:04.518675 waagent[1674]: 2024-07-02T01:50:04.518617Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Jul 2 01:50:04.520033 waagent[1674]: 2024-07-02T01:50:04.519974Z INFO ExtHandler Jul 2 01:50:04.520260 waagent[1674]: 2024-07-02T01:50:04.520213Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Jul 2 01:50:04.527241 waagent[1674]: 2024-07-02T01:50:04.527190Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Jul 2 01:50:04.527904 waagent[1674]: 2024-07-02T01:50:04.527857Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Jul 2 01:50:04.548940 waagent[1674]: 2024-07-02T01:50:04.548876Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Jul 2 01:50:04.626679 waagent[1674]: 2024-07-02T01:50:04.626539Z INFO ExtHandler Downloaded certificate {'thumbprint': '7BB49B77886E69ECFE71A87ABD537418BE933108', 'hasPrivateKey': True} Jul 2 01:50:04.628117 waagent[1674]: 2024-07-02T01:50:04.628039Z INFO ExtHandler Downloaded certificate {'thumbprint': '218C59AA1F56444B351E890F93F894D26A31FAE3', 'hasPrivateKey': False} Jul 2 01:50:04.629444 waagent[1674]: 2024-07-02T01:50:04.629380Z INFO ExtHandler Fetch goal state completed Jul 2 01:50:04.653122 waagent[1674]: 2024-07-02T01:50:04.653012Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.7 1 Nov 2022 (Library: OpenSSL 3.0.7 1 Nov 2022) Jul 2 01:50:04.666517 waagent[1674]: 2024-07-02T01:50:04.666395Z INFO ExtHandler ExtHandler WALinuxAgent-2.11.1.4 running as process 1674 Jul 2 01:50:04.671434 waagent[1674]: 2024-07-02T01:50:04.671354Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.5', '', 'Flatcar Container Linux by Kinvolk'] Jul 2 01:50:04.673202 waagent[1674]: 2024-07-02T01:50:04.673129Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Jul 2 01:50:04.679500 waagent[1674]: 2024-07-02T01:50:04.679427Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Jul 2 01:50:05.041445 waagent[1674]: 2024-07-02T01:50:05.041202Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Jul 2 01:50:05.051336 waagent[1674]: 2024-07-02T01:50:05.051271Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Jul 2 01:50:05.052119 waagent[1674]: 2024-07-02T01:50:05.052056Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Jul 2 01:50:05.060153 waagent[1674]: 2024-07-02T01:50:05.060031Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Jul 2 01:50:05.061551 waagent[1674]: 2024-07-02T01:50:05.061433Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Jul 2 01:50:05.063635 waagent[1674]: 2024-07-02T01:50:05.063553Z INFO ExtHandler ExtHandler Starting env monitor service. Jul 2 01:50:05.063928 waagent[1674]: 2024-07-02T01:50:05.063848Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:50:05.064607 waagent[1674]: 2024-07-02T01:50:05.064539Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:50:05.065245 waagent[1674]: 2024-07-02T01:50:05.065178Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Jul 2 01:50:05.065630 waagent[1674]: 2024-07-02T01:50:05.065567Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Jul 2 01:50:05.065630 waagent[1674]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Jul 2 01:50:05.065630 waagent[1674]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Jul 2 01:50:05.065630 waagent[1674]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Jul 2 01:50:05.065630 waagent[1674]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:50:05.065630 waagent[1674]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:50:05.065630 waagent[1674]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Jul 2 01:50:05.068300 waagent[1674]: 2024-07-02T01:50:05.068159Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Jul 2 01:50:05.069428 waagent[1674]: 2024-07-02T01:50:05.069340Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Jul 2 01:50:05.069664 waagent[1674]: 2024-07-02T01:50:05.069605Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Jul 2 01:50:05.070686 waagent[1674]: 2024-07-02T01:50:05.070126Z INFO EnvHandler ExtHandler Configure routes Jul 2 01:50:05.070949 waagent[1674]: 2024-07-02T01:50:05.070862Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Jul 2 01:50:05.073411 waagent[1674]: 2024-07-02T01:50:05.073255Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Jul 2 01:50:05.073904 waagent[1674]: 2024-07-02T01:50:05.073821Z INFO EnvHandler ExtHandler Gateway:None Jul 2 01:50:05.074634 waagent[1674]: 2024-07-02T01:50:05.074565Z INFO EnvHandler ExtHandler Routes:None Jul 2 01:50:05.078090 waagent[1674]: 2024-07-02T01:50:05.077909Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Jul 2 01:50:05.078399 waagent[1674]: 2024-07-02T01:50:05.078317Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Jul 2 01:50:05.083171 waagent[1674]: 2024-07-02T01:50:05.083015Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Jul 2 01:50:05.091783 waagent[1674]: 2024-07-02T01:50:05.091680Z INFO MonitorHandler ExtHandler Network interfaces: Jul 2 01:50:05.091783 waagent[1674]: Executing ['ip', '-a', '-o', 'link']: Jul 2 01:50:05.091783 waagent[1674]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Jul 2 01:50:05.091783 waagent[1674]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b3:fb:d9 brd ff:ff:ff:ff:ff:ff Jul 2 01:50:05.091783 waagent[1674]: 3: enP12535s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b3:fb:d9 brd ff:ff:ff:ff:ff:ff\ altname enP12535p0s2 Jul 2 01:50:05.091783 waagent[1674]: Executing ['ip', '-4', '-a', '-o', 'address']: Jul 2 01:50:05.091783 waagent[1674]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Jul 2 01:50:05.091783 waagent[1674]: 2: eth0 inet 10.200.20.43/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Jul 2 01:50:05.091783 waagent[1674]: Executing ['ip', '-6', '-a', '-o', 'address']: Jul 2 01:50:05.091783 waagent[1674]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Jul 2 01:50:05.091783 waagent[1674]: 2: eth0 inet6 fe80::222:48ff:feb3:fbd9/64 scope link \ valid_lft forever preferred_lft forever Jul 2 01:50:05.099625 waagent[1674]: 2024-07-02T01:50:05.099241Z INFO ExtHandler ExtHandler Downloading agent manifest Jul 2 01:50:05.113973 waagent[1674]: 2024-07-02T01:50:05.113867Z INFO ExtHandler ExtHandler Jul 2 01:50:05.114991 waagent[1674]: 2024-07-02T01:50:05.114919Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 1f9eb4c8-3869-43e7-81f7-115db43556d8 correlation c81b4eb6-c09b-415c-aa04-ce2635bd711e created: 2024-07-02T01:48:30.160629Z] Jul 2 01:50:05.117226 waagent[1674]: 2024-07-02T01:50:05.117143Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Jul 2 01:50:05.121156 waagent[1674]: 2024-07-02T01:50:05.121089Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 7 ms] Jul 2 01:50:05.143914 waagent[1674]: 2024-07-02T01:50:05.143841Z INFO ExtHandler ExtHandler Looking for existing remote access users. Jul 2 01:50:05.178302 waagent[1674]: 2024-07-02T01:50:05.178206Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.11.1.4 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 44364808-03F3-4B1E-A7F4-0B4DFBDAFCD8;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Jul 2 01:50:05.368664 waagent[1674]: 2024-07-02T01:50:05.368524Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Jul 2 01:50:05.368664 waagent[1674]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:50:05.368664 waagent[1674]: pkts bytes target prot opt in out source destination Jul 2 01:50:05.368664 waagent[1674]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:50:05.368664 waagent[1674]: pkts bytes target prot opt in out source destination Jul 2 01:50:05.368664 waagent[1674]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:50:05.368664 waagent[1674]: pkts bytes target prot opt in out source destination Jul 2 01:50:05.368664 waagent[1674]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Jul 2 01:50:05.368664 waagent[1674]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Jul 2 01:50:05.368664 waagent[1674]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Jul 2 01:50:05.377297 waagent[1674]: 2024-07-02T01:50:05.377162Z INFO EnvHandler ExtHandler Current Firewall rules: Jul 2 01:50:05.377297 waagent[1674]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:50:05.377297 waagent[1674]: pkts bytes target prot opt in out source destination Jul 2 01:50:05.377297 waagent[1674]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:50:05.377297 waagent[1674]: pkts bytes target prot opt in out source destination Jul 2 01:50:05.377297 waagent[1674]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Jul 2 01:50:05.377297 waagent[1674]: pkts bytes target prot opt in out source destination Jul 2 01:50:05.377297 waagent[1674]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Jul 2 01:50:05.377297 waagent[1674]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Jul 2 01:50:05.377297 waagent[1674]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Jul 2 01:50:05.377912 waagent[1674]: 2024-07-02T01:50:05.377854Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Jul 2 01:50:11.325353 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 01:50:11.325584 systemd[1]: Stopped kubelet.service. Jul 2 01:50:11.327049 systemd[1]: Starting kubelet.service... Jul 2 01:50:11.406229 systemd[1]: Started kubelet.service. Jul 2 01:50:11.930481 kubelet[1729]: E0702 01:50:11.930429 1729 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:50:11.932762 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:50:11.932886 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:50:22.075385 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Jul 2 01:50:22.075606 systemd[1]: Stopped kubelet.service. Jul 2 01:50:22.077049 systemd[1]: Starting kubelet.service... Jul 2 01:50:22.153255 systemd[1]: Started kubelet.service. Jul 2 01:50:22.674323 kubelet[1739]: E0702 01:50:22.674245 1739 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:50:22.676647 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:50:22.676766 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:50:27.438325 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Jul 2 01:50:32.825385 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Jul 2 01:50:32.825630 systemd[1]: Stopped kubelet.service. Jul 2 01:50:32.827133 systemd[1]: Starting kubelet.service... Jul 2 01:50:32.906399 systemd[1]: Started kubelet.service. Jul 2 01:50:33.440948 kubelet[1750]: E0702 01:50:33.440906 1750 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:50:33.442963 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:50:33.443094 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:50:35.050964 update_engine[1459]: I0702 01:50:35.050513 1459 update_attempter.cc:509] Updating boot flags... Jul 2 01:50:37.176040 systemd[1]: Created slice system-sshd.slice. Jul 2 01:50:37.177636 systemd[1]: Started sshd@0-10.200.20.43:22-10.200.16.10:43438.service. Jul 2 01:50:37.940494 sshd[1824]: Accepted publickey for core from 10.200.16.10 port 43438 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:50:37.956722 sshd[1824]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:50:37.961488 systemd[1]: Started session-3.scope. Jul 2 01:50:37.962516 systemd-logind[1455]: New session 3 of user core. Jul 2 01:50:38.355997 systemd[1]: Started sshd@1-10.200.20.43:22-10.200.16.10:39774.service. Jul 2 01:50:38.787014 sshd[1829]: Accepted publickey for core from 10.200.16.10 port 39774 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:50:38.788985 sshd[1829]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:50:38.793633 systemd[1]: Started session-4.scope. Jul 2 01:50:38.794515 systemd-logind[1455]: New session 4 of user core. Jul 2 01:50:39.101667 sshd[1829]: pam_unix(sshd:session): session closed for user core Jul 2 01:50:39.104285 systemd[1]: sshd@1-10.200.20.43:22-10.200.16.10:39774.service: Deactivated successfully. Jul 2 01:50:39.105006 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 01:50:39.105635 systemd-logind[1455]: Session 4 logged out. Waiting for processes to exit. Jul 2 01:50:39.106812 systemd-logind[1455]: Removed session 4. Jul 2 01:50:39.178568 systemd[1]: Started sshd@2-10.200.20.43:22-10.200.16.10:39778.service. Jul 2 01:50:39.641676 sshd[1835]: Accepted publickey for core from 10.200.16.10 port 39778 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:50:39.643047 sshd[1835]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:50:39.647223 systemd-logind[1455]: New session 5 of user core. Jul 2 01:50:39.647662 systemd[1]: Started session-5.scope. Jul 2 01:50:39.984748 sshd[1835]: pam_unix(sshd:session): session closed for user core Jul 2 01:50:39.987343 systemd[1]: sshd@2-10.200.20.43:22-10.200.16.10:39778.service: Deactivated successfully. Jul 2 01:50:39.988030 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 01:50:39.988657 systemd-logind[1455]: Session 5 logged out. Waiting for processes to exit. Jul 2 01:50:39.989767 systemd-logind[1455]: Removed session 5. Jul 2 01:50:40.065404 systemd[1]: Started sshd@3-10.200.20.43:22-10.200.16.10:39792.service. Jul 2 01:50:40.536825 sshd[1844]: Accepted publickey for core from 10.200.16.10 port 39792 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:50:40.538198 sshd[1844]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:50:40.542504 systemd-logind[1455]: New session 6 of user core. Jul 2 01:50:40.542904 systemd[1]: Started session-6.scope. Jul 2 01:50:40.889155 sshd[1844]: pam_unix(sshd:session): session closed for user core Jul 2 01:50:40.892076 systemd[1]: sshd@3-10.200.20.43:22-10.200.16.10:39792.service: Deactivated successfully. Jul 2 01:50:40.892781 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 01:50:40.893388 systemd-logind[1455]: Session 6 logged out. Waiting for processes to exit. Jul 2 01:50:40.894534 systemd-logind[1455]: Removed session 6. Jul 2 01:50:40.961292 systemd[1]: Started sshd@4-10.200.20.43:22-10.200.16.10:39796.service. Jul 2 01:50:41.392871 sshd[1850]: Accepted publickey for core from 10.200.16.10 port 39796 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:50:41.394681 sshd[1850]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:50:41.399074 systemd[1]: Started session-7.scope. Jul 2 01:50:41.399467 systemd-logind[1455]: New session 7 of user core. Jul 2 01:50:41.858830 sudo[1853]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 01:50:41.859406 sudo[1853]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:50:41.916694 dbus-daemon[1443]: avc: received setenforce notice (enforcing=1) Jul 2 01:50:41.918585 sudo[1853]: pam_unix(sudo:session): session closed for user root Jul 2 01:50:42.002693 sshd[1850]: pam_unix(sshd:session): session closed for user core Jul 2 01:50:42.006005 systemd-logind[1455]: Session 7 logged out. Waiting for processes to exit. Jul 2 01:50:42.007634 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 01:50:42.008923 systemd-logind[1455]: Removed session 7. Jul 2 01:50:42.009562 systemd[1]: sshd@4-10.200.20.43:22-10.200.16.10:39796.service: Deactivated successfully. Jul 2 01:50:42.075764 systemd[1]: Started sshd@5-10.200.20.43:22-10.200.16.10:39810.service. Jul 2 01:50:42.508497 sshd[1857]: Accepted publickey for core from 10.200.16.10 port 39810 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:50:42.510104 sshd[1857]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:50:42.514179 systemd-logind[1455]: New session 8 of user core. Jul 2 01:50:42.514739 systemd[1]: Started session-8.scope. Jul 2 01:50:42.755771 sudo[1861]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 01:50:42.755985 sudo[1861]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:50:42.758685 sudo[1861]: pam_unix(sudo:session): session closed for user root Jul 2 01:50:42.763650 sudo[1860]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 01:50:42.764140 sudo[1860]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:50:42.773283 systemd[1]: Stopping audit-rules.service... Jul 2 01:50:42.778237 kernel: kauditd_printk_skb: 2 callbacks suppressed Jul 2 01:50:42.778356 kernel: audit: type=1305 audit(1719885042.772:201): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 01:50:42.772000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 01:50:42.788210 auditctl[1864]: No rules Jul 2 01:50:42.772000 audit[1864]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe4f01920 a2=420 a3=0 items=0 ppid=1 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.809171 kernel: audit: type=1300 audit(1719885042.772:201): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe4f01920 a2=420 a3=0 items=0 ppid=1 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:42.788391 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 01:50:42.809304 systemd[1]: Stopped audit-rules.service. Jul 2 01:50:42.772000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 01:50:42.816690 kernel: audit: type=1327 audit(1719885042.772:201): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 01:50:42.811056 systemd[1]: Starting audit-rules.service... Jul 2 01:50:42.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:42.833054 kernel: audit: type=1131 audit(1719885042.808:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:42.841985 augenrules[1881]: No rules Jul 2 01:50:42.843091 systemd[1]: Finished audit-rules.service. Jul 2 01:50:42.894103 kernel: audit: type=1130 audit(1719885042.841:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:42.894199 kernel: audit: type=1106 audit(1719885042.844:204): pid=1860 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:50:42.894239 kernel: audit: type=1104 audit(1719885042.844:205): pid=1860 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:50:42.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:42.844000 audit[1860]: USER_END pid=1860 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:50:42.844000 audit[1860]: CRED_DISP pid=1860 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:50:42.845682 sudo[1860]: pam_unix(sudo:session): session closed for user root Jul 2 01:50:42.927473 sshd[1857]: pam_unix(sshd:session): session closed for user core Jul 2 01:50:42.930148 systemd[1]: sshd@5-10.200.20.43:22-10.200.16.10:39810.service: Deactivated successfully. Jul 2 01:50:42.930917 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 01:50:42.926000 audit[1857]: USER_END pid=1857 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:50:42.927000 audit[1857]: CRED_DISP pid=1857 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:50:42.987828 kernel: audit: type=1106 audit(1719885042.926:206): pid=1857 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:50:42.988205 kernel: audit: type=1104 audit(1719885042.927:207): pid=1857 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:50:42.988244 kernel: audit: type=1131 audit(1719885042.928:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.43:22-10.200.16.10:39810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:42.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.43:22-10.200.16.10:39810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:42.971059 systemd-logind[1455]: Session 8 logged out. Waiting for processes to exit. Jul 2 01:50:42.988851 systemd-logind[1455]: Removed session 8. Jul 2 01:50:42.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.43:22-10.200.16.10:39818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:42.998951 systemd[1]: Started sshd@6-10.200.20.43:22-10.200.16.10:39818.service. Jul 2 01:50:43.428000 audit[1887]: USER_ACCT pid=1887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:50:43.430472 sshd[1887]: Accepted publickey for core from 10.200.16.10 port 39818 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:50:43.430000 audit[1887]: CRED_ACQ pid=1887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:50:43.430000 audit[1887]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc8e10c30 a2=3 a3=1 items=0 ppid=1 pid=1887 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:43.430000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:50:43.431988 sshd[1887]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:50:43.436347 systemd[1]: Started session-9.scope. Jul 2 01:50:43.437528 systemd-logind[1455]: New session 9 of user core. Jul 2 01:50:43.440000 audit[1887]: USER_START pid=1887 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:50:43.442000 audit[1889]: CRED_ACQ pid=1889 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:50:43.575271 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Jul 2 01:50:43.575439 systemd[1]: Stopped kubelet.service. Jul 2 01:50:43.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:43.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:43.576942 systemd[1]: Starting kubelet.service... Jul 2 01:50:43.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:43.659578 systemd[1]: Started kubelet.service. Jul 2 01:50:43.675000 audit[1900]: USER_ACCT pid=1900 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:50:43.675000 audit[1900]: CRED_REFR pid=1900 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:50:43.677262 sudo[1900]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 01:50:43.677514 sudo[1900]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:50:43.678000 audit[1900]: USER_START pid=1900 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:50:44.245217 kubelet[1894]: E0702 01:50:44.245139 1894 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:50:44.247119 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:50:44.247250 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:50:44.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 01:50:44.498886 systemd[1]: Starting docker.service... Jul 2 01:50:44.536612 env[1910]: time="2024-07-02T01:50:44.536563564Z" level=info msg="Starting up" Jul 2 01:50:44.538475 env[1910]: time="2024-07-02T01:50:44.538414197Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 01:50:44.538594 env[1910]: time="2024-07-02T01:50:44.538442316Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 01:50:44.538594 env[1910]: time="2024-07-02T01:50:44.538517074Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 01:50:44.538594 env[1910]: time="2024-07-02T01:50:44.538529154Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 01:50:44.540382 env[1910]: time="2024-07-02T01:50:44.540348148Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 01:50:44.540382 env[1910]: time="2024-07-02T01:50:44.540373987Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 01:50:44.540627 env[1910]: time="2024-07-02T01:50:44.540392827Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 01:50:44.540627 env[1910]: time="2024-07-02T01:50:44.540401906Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 01:50:44.651394 env[1910]: time="2024-07-02T01:50:44.651298878Z" level=info msg="Loading containers: start." Jul 2 01:50:44.737000 audit[1938]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1938 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:44.737000 audit[1938]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffec7f23b0 a2=0 a3=1 items=0 ppid=1910 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:44.737000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 01:50:44.739000 audit[1940]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1940 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:44.739000 audit[1940]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffebd1d0d0 a2=0 a3=1 items=0 ppid=1910 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:44.739000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 01:50:44.741000 audit[1942]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1942 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:44.741000 audit[1942]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffdc6be510 a2=0 a3=1 items=0 ppid=1910 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:44.741000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 01:50:44.743000 audit[1944]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1944 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:44.743000 audit[1944]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc30415d0 a2=0 a3=1 items=0 ppid=1910 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:44.743000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 01:50:44.744000 audit[1946]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1946 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:44.744000 audit[1946]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdd54f4d0 a2=0 a3=1 items=0 ppid=1910 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:44.744000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 01:50:44.746000 audit[1948]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1948 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:44.746000 audit[1948]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffff9a3220 a2=0 a3=1 items=0 ppid=1910 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:44.746000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 01:50:44.767000 audit[1950]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:44.767000 audit[1950]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcf331b20 a2=0 a3=1 items=0 ppid=1910 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:44.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 01:50:44.769000 audit[1952]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:44.769000 audit[1952]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffc431d400 a2=0 a3=1 items=0 ppid=1910 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:44.769000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 01:50:44.772000 audit[1954]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1954 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:44.772000 audit[1954]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffc4f94370 a2=0 a3=1 items=0 ppid=1910 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:44.772000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 01:50:44.787000 audit[1958]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1958 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:44.787000 audit[1958]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc6109c60 a2=0 a3=1 items=0 ppid=1910 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:44.787000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 01:50:44.788000 audit[1959]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:44.788000 audit[1959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffdd824310 a2=0 a3=1 items=0 ppid=1910 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:44.788000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 01:50:44.816480 kernel: Initializing XFRM netlink socket Jul 2 01:50:44.839700 env[1910]: time="2024-07-02T01:50:44.839655875Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 01:50:44.988000 audit[1967]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1967 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:44.988000 audit[1967]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffccc8d2f0 a2=0 a3=1 items=0 ppid=1910 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:44.988000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 01:50:45.011000 audit[1970]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:45.011000 audit[1970]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffe3a02210 a2=0 a3=1 items=0 ppid=1910 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:45.011000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 01:50:45.015000 audit[1973]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1973 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:45.015000 audit[1973]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffcc18d060 a2=0 a3=1 items=0 ppid=1910 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:45.015000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 01:50:45.017000 audit[1975]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1975 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:45.017000 audit[1975]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd4f16f00 a2=0 a3=1 items=0 ppid=1910 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:45.017000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 01:50:45.020000 audit[1977]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1977 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:45.020000 audit[1977]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffe2ee5f40 a2=0 a3=1 items=0 ppid=1910 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:45.020000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 01:50:45.022000 audit[1979]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:45.022000 audit[1979]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffc27bc940 a2=0 a3=1 items=0 ppid=1910 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:45.022000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 01:50:45.024000 audit[1981]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:45.024000 audit[1981]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffde27c320 a2=0 a3=1 items=0 ppid=1910 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:45.024000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 01:50:45.027000 audit[1983]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1983 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:45.027000 audit[1983]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffcb9cfa10 a2=0 a3=1 items=0 ppid=1910 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:45.027000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 01:50:45.029000 audit[1985]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:45.029000 audit[1985]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffd2f93730 a2=0 a3=1 items=0 ppid=1910 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:45.029000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 01:50:45.031000 audit[1987]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1987 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:45.031000 audit[1987]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffc29bf7f0 a2=0 a3=1 items=0 ppid=1910 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:45.031000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 01:50:45.033000 audit[1989]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:45.033000 audit[1989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffef9d01f0 a2=0 a3=1 items=0 ppid=1910 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:45.033000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 01:50:45.036093 systemd-networkd[1624]: docker0: Link UP Jul 2 01:50:45.052000 audit[1993]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1993 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:45.052000 audit[1993]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe7be54b0 a2=0 a3=1 items=0 ppid=1910 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:45.052000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 01:50:45.053000 audit[1994]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:50:45.053000 audit[1994]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffea55d5c0 a2=0 a3=1 items=0 ppid=1910 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:50:45.053000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 01:50:45.056005 env[1910]: time="2024-07-02T01:50:45.055964046Z" level=info msg="Loading containers: done." Jul 2 01:50:45.068962 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2311640736-merged.mount: Deactivated successfully. Jul 2 01:50:45.123678 env[1910]: time="2024-07-02T01:50:45.123629668Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 01:50:45.124086 env[1910]: time="2024-07-02T01:50:45.124065298Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 2 01:50:45.124301 env[1910]: time="2024-07-02T01:50:45.124284212Z" level=info msg="Daemon has completed initialization" Jul 2 01:50:45.155260 systemd[1]: Started docker.service. Jul 2 01:50:45.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:45.161711 env[1910]: time="2024-07-02T01:50:45.161647799Z" level=info msg="API listen on /run/docker.sock" Jul 2 01:50:50.021726 env[1471]: time="2024-07-02T01:50:50.021675556Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.2\"" Jul 2 01:50:50.971120 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3308104259.mount: Deactivated successfully. Jul 2 01:50:52.842722 env[1471]: time="2024-07-02T01:50:52.842670009Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:52.849649 env[1471]: time="2024-07-02T01:50:52.849594439Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84c601f3f72c87776cdcf77a73329d1f45297e43a92508b0f289fa2fcf8872a0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:52.853027 env[1471]: time="2024-07-02T01:50:52.852993237Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:52.857982 env[1471]: time="2024-07-02T01:50:52.857943934Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:340ab4a1d66a60630a7a298aa0b2576fcd82e51ecdddb751cf61e5d3846fde2d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:52.858697 env[1471]: time="2024-07-02T01:50:52.858667530Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.2\" returns image reference \"sha256:84c601f3f72c87776cdcf77a73329d1f45297e43a92508b0f289fa2fcf8872a0\"" Jul 2 01:50:52.867976 env[1471]: time="2024-07-02T01:50:52.867935113Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.2\"" Jul 2 01:50:54.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:54.325308 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. Jul 2 01:50:54.325503 systemd[1]: Stopped kubelet.service. Jul 2 01:50:54.326966 systemd[1]: Starting kubelet.service... Jul 2 01:50:54.329321 kernel: kauditd_printk_skb: 88 callbacks suppressed Jul 2 01:50:54.329410 kernel: audit: type=1130 audit(1719885054.324:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:54.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:54.367565 kernel: audit: type=1131 audit(1719885054.324:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:54.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:54.408730 systemd[1]: Started kubelet.service. Jul 2 01:50:54.426514 kernel: audit: type=1130 audit(1719885054.407:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:50:54.474877 kubelet[2043]: E0702 01:50:54.474824 2043 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:50:54.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 01:50:54.477044 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:50:54.477163 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:50:54.494497 kernel: audit: type=1131 audit(1719885054.475:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 01:50:55.303839 env[1471]: time="2024-07-02T01:50:55.303782174Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:55.310672 env[1471]: time="2024-07-02T01:50:55.310614473Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e1dcc3400d3ea6a268c7ea6e66c3a196703770a8e346b695f54344ab53a47567,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:55.315172 env[1471]: time="2024-07-02T01:50:55.315120074Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:55.319801 env[1471]: time="2024-07-02T01:50:55.319753706Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4c412bc1fc585ddeba10d34a02e7507ea787ec2c57256d4c18fd230377ab048e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:55.320589 env[1471]: time="2024-07-02T01:50:55.320555425Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.2\" returns image reference \"sha256:e1dcc3400d3ea6a268c7ea6e66c3a196703770a8e346b695f54344ab53a47567\"" Jul 2 01:50:55.334049 env[1471]: time="2024-07-02T01:50:55.334003250Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.2\"" Jul 2 01:50:58.309368 env[1471]: time="2024-07-02T01:50:58.309313191Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:58.316330 env[1471]: time="2024-07-02T01:50:58.316288870Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7dd04b1bafeb51c650fde7f34ac0fdafa96030e77ea7a822135ff302d895dd5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:58.322607 env[1471]: time="2024-07-02T01:50:58.322572031Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:58.327750 env[1471]: time="2024-07-02T01:50:58.327714329Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:0ed75a333704f5d315395c6ec04d7af7405715537069b65d40b43ec1c8e030bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:50:58.328225 env[1471]: time="2024-07-02T01:50:58.328200841Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.2\" returns image reference \"sha256:c7dd04b1bafeb51c650fde7f34ac0fdafa96030e77ea7a822135ff302d895dd5\"" Jul 2 01:50:58.337512 env[1471]: time="2024-07-02T01:50:58.337472166Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\"" Jul 2 01:50:59.866658 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3706757166.mount: Deactivated successfully. Jul 2 01:51:00.371464 env[1471]: time="2024-07-02T01:51:00.371402964Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:00.378939 env[1471]: time="2024-07-02T01:51:00.378896832Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66dbb96a9149f69913ff817f696be766014cacdffc2ce0889a76c81165415fae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:00.383624 env[1471]: time="2024-07-02T01:51:00.383588771Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:00.388016 env[1471]: time="2024-07-02T01:51:00.387980646Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8a44c6e094af3dea3de57fa967e201608a358a3bd8b4e3f31ab905bbe4108aec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:00.388680 env[1471]: time="2024-07-02T01:51:00.388652632Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\" returns image reference \"sha256:66dbb96a9149f69913ff817f696be766014cacdffc2ce0889a76c81165415fae\"" Jul 2 01:51:00.400510 env[1471]: time="2024-07-02T01:51:00.400475360Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Jul 2 01:51:02.149901 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1621940910.mount: Deactivated successfully. Jul 2 01:51:03.455177 env[1471]: time="2024-07-02T01:51:03.455093280Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:03.462770 env[1471]: time="2024-07-02T01:51:03.462694165Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:03.524200 env[1471]: time="2024-07-02T01:51:03.524151137Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:03.529080 env[1471]: time="2024-07-02T01:51:03.529041479Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:03.529919 env[1471]: time="2024-07-02T01:51:03.529860683Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" Jul 2 01:51:03.538585 env[1471]: time="2024-07-02T01:51:03.538552427Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Jul 2 01:51:04.165082 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1746185048.mount: Deactivated successfully. Jul 2 01:51:04.187550 env[1471]: time="2024-07-02T01:51:04.187468699Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:04.195145 env[1471]: time="2024-07-02T01:51:04.195104551Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:04.200387 env[1471]: time="2024-07-02T01:51:04.200347936Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:04.205590 env[1471]: time="2024-07-02T01:51:04.205539511Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:04.206206 env[1471]: time="2024-07-02T01:51:04.206177796Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Jul 2 01:51:04.218084 env[1471]: time="2024-07-02T01:51:04.218042155Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Jul 2 01:51:04.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:04.575324 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 7. Jul 2 01:51:04.575517 systemd[1]: Stopped kubelet.service. Jul 2 01:51:04.577034 systemd[1]: Starting kubelet.service... Jul 2 01:51:04.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:04.610299 kernel: audit: type=1130 audit(1719885064.575:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:04.610433 kernel: audit: type=1131 audit(1719885064.575:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:04.663665 systemd[1]: Started kubelet.service. Jul 2 01:51:04.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:04.683558 kernel: audit: type=1130 audit(1719885064.663:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:05.516869 kernel: audit: type=1131 audit(1719885065.193:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 01:51:05.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 01:51:05.517068 kubelet[2080]: E0702 01:51:05.191987 2080 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 01:51:05.193898 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 01:51:05.194020 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 01:51:05.739655 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1142143838.mount: Deactivated successfully. Jul 2 01:51:09.088920 env[1471]: time="2024-07-02T01:51:09.088721401Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:09.094823 env[1471]: time="2024-07-02T01:51:09.094784523Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:014faa467e29798aeef733fe6d1a3b5e382688217b053ad23410e6cccd5d22fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:09.100101 env[1471]: time="2024-07-02T01:51:09.100067951Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:09.104056 env[1471]: time="2024-07-02T01:51:09.104023151Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:09.104806 env[1471]: time="2024-07-02T01:51:09.104775920Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:014faa467e29798aeef733fe6d1a3b5e382688217b053ad23410e6cccd5d22fd\"" Jul 2 01:51:15.112213 systemd[1]: Stopped kubelet.service. Jul 2 01:51:15.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:15.130048 systemd[1]: Starting kubelet.service... Jul 2 01:51:15.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:15.148515 kernel: audit: type=1130 audit(1719885075.111:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:15.148626 kernel: audit: type=1131 audit(1719885075.126:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:15.170548 systemd[1]: Reloading. Jul 2 01:51:15.256654 /usr/lib/systemd/system-generators/torcx-generator[2172]: time="2024-07-02T01:51:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 01:51:15.259041 /usr/lib/systemd/system-generators/torcx-generator[2172]: time="2024-07-02T01:51:15Z" level=info msg="torcx already run" Jul 2 01:51:15.352240 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 01:51:15.352260 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 01:51:15.368697 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 01:51:15.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477809 kernel: audit: type=1400 audit(1719885075.440:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477920 kernel: audit: type=1400 audit(1719885075.440:258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.496231 kernel: audit: type=1400 audit(1719885075.440:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.514075 kernel: audit: type=1400 audit(1719885075.440:260): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.514162 kernel: audit: type=1400 audit(1719885075.440:261): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.531929 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 01:51:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.562544 kernel: audit: type=1400 audit(1719885075.440:262): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.562687 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 01:51:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.459000 audit: BPF prog-id=41 op=LOAD Jul 2 01:51:15.459000 audit: BPF prog-id=34 op=UNLOAD Jul 2 01:51:15.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit: BPF prog-id=42 op=LOAD Jul 2 01:51:15.477000 audit: BPF prog-id=24 op=UNLOAD Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit: BPF prog-id=43 op=LOAD Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit: BPF prog-id=44 op=LOAD Jul 2 01:51:15.477000 audit: BPF prog-id=25 op=UNLOAD Jul 2 01:51:15.477000 audit: BPF prog-id=26 op=UNLOAD Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.496000 audit: BPF prog-id=45 op=LOAD Jul 2 01:51:15.496000 audit: BPF prog-id=27 op=UNLOAD Jul 2 01:51:15.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.514000 audit: BPF prog-id=46 op=LOAD Jul 2 01:51:15.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.563000 audit: BPF prog-id=49 op=LOAD Jul 2 01:51:15.563000 audit: BPF prog-id=38 op=UNLOAD Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit: BPF prog-id=50 op=LOAD Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.565000 audit: BPF prog-id=51 op=LOAD Jul 2 01:51:15.565000 audit: BPF prog-id=30 op=UNLOAD Jul 2 01:51:15.565000 audit: BPF prog-id=31 op=UNLOAD Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit: BPF prog-id=52 op=LOAD Jul 2 01:51:15.566000 audit: BPF prog-id=35 op=UNLOAD Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit: BPF prog-id=53 op=LOAD Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.566000 audit: BPF prog-id=54 op=LOAD Jul 2 01:51:15.566000 audit: BPF prog-id=36 op=UNLOAD Jul 2 01:51:15.566000 audit: BPF prog-id=37 op=UNLOAD Jul 2 01:51:15.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:15.567000 audit: BPF prog-id=55 op=LOAD Jul 2 01:51:15.567000 audit: BPF prog-id=40 op=UNLOAD Jul 2 01:51:15.585570 systemd[1]: Started kubelet.service. Jul 2 01:51:15.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:15.594755 systemd[1]: Stopping kubelet.service... Jul 2 01:51:15.595369 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 01:51:15.595596 systemd[1]: Stopped kubelet.service. Jul 2 01:51:15.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:15.597662 systemd[1]: Starting kubelet.service... Jul 2 01:51:16.041612 systemd[1]: Started kubelet.service. Jul 2 01:51:16.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:16.091144 kubelet[2244]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 01:51:16.091144 kubelet[2244]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 01:51:16.091144 kubelet[2244]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 01:51:16.091541 kubelet[2244]: I0702 01:51:16.091158 2244 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 01:51:17.104758 kubelet[2244]: I0702 01:51:17.104723 2244 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Jul 2 01:51:17.105091 kubelet[2244]: I0702 01:51:17.105078 2244 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 01:51:17.105757 kubelet[2244]: I0702 01:51:17.105734 2244 server.go:927] "Client rotation is on, will bootstrap in background" Jul 2 01:51:17.118770 kubelet[2244]: E0702 01:51:17.118741 2244 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.43:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:17.119166 kubelet[2244]: I0702 01:51:17.119144 2244 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 01:51:17.130668 kubelet[2244]: I0702 01:51:17.130642 2244 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 01:51:17.132327 kubelet[2244]: I0702 01:51:17.132285 2244 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 01:51:17.132746 kubelet[2244]: I0702 01:51:17.132520 2244 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.5-a-118aa0dcdb","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 01:51:17.132908 kubelet[2244]: I0702 01:51:17.132896 2244 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 01:51:17.132968 kubelet[2244]: I0702 01:51:17.132960 2244 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 01:51:17.133150 kubelet[2244]: I0702 01:51:17.133140 2244 state_mem.go:36] "Initialized new in-memory state store" Jul 2 01:51:17.134229 kubelet[2244]: I0702 01:51:17.134212 2244 kubelet.go:400] "Attempting to sync node with API server" Jul 2 01:51:17.134335 kubelet[2244]: I0702 01:51:17.134325 2244 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 01:51:17.134414 kubelet[2244]: I0702 01:51:17.134405 2244 kubelet.go:312] "Adding apiserver pod source" Jul 2 01:51:17.134541 kubelet[2244]: I0702 01:51:17.134530 2244 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 01:51:17.136550 kubelet[2244]: W0702 01:51:17.136424 2244 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.20.43:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-118aa0dcdb&limit=500&resourceVersion=0": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:17.136550 kubelet[2244]: E0702 01:51:17.136499 2244 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.43:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-118aa0dcdb&limit=500&resourceVersion=0": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:17.136670 kubelet[2244]: I0702 01:51:17.136591 2244 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 01:51:17.136802 kubelet[2244]: I0702 01:51:17.136742 2244 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 01:51:17.136802 kubelet[2244]: W0702 01:51:17.136799 2244 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 01:51:17.137384 kubelet[2244]: I0702 01:51:17.137320 2244 server.go:1264] "Started kubelet" Jul 2 01:51:17.142000 audit[2244]: AVC avc: denied { mac_admin } for pid=2244 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:17.142000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:51:17.142000 audit[2244]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007672f0 a1=4000a22750 a2=40007672c0 a3=25 items=0 ppid=1 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:17.142000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:51:17.143000 audit[2244]: AVC avc: denied { mac_admin } for pid=2244 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:17.143000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:51:17.143000 audit[2244]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d789c0 a1=4000a22768 a2=4000767380 a3=25 items=0 ppid=1 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:17.143000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:51:17.143944 kubelet[2244]: I0702 01:51:17.143493 2244 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 01:51:17.143944 kubelet[2244]: I0702 01:51:17.143533 2244 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 01:51:17.143944 kubelet[2244]: I0702 01:51:17.143600 2244 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 01:51:17.146245 kubelet[2244]: W0702 01:51:17.146193 2244 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.20.43:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:17.146419 kubelet[2244]: E0702 01:51:17.146408 2244 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.43:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:17.146704 kubelet[2244]: E0702 01:51:17.146603 2244 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.20.43:6443/api/v1/namespaces/default/events\": dial tcp 10.200.20.43:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.5-a-118aa0dcdb.17de425d85439114 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.5-a-118aa0dcdb,UID:ci-3510.3.5-a-118aa0dcdb,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.5-a-118aa0dcdb,},FirstTimestamp:2024-07-02 01:51:17.137297684 +0000 UTC m=+1.089962415,LastTimestamp:2024-07-02 01:51:17.137297684 +0000 UTC m=+1.089962415,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.5-a-118aa0dcdb,}" Jul 2 01:51:17.149099 kubelet[2244]: I0702 01:51:17.149057 2244 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 01:51:17.148000 audit[2256]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:17.148000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcb0b0cb0 a2=0 a3=1 items=0 ppid=2244 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:17.148000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 01:51:17.150904 kubelet[2244]: I0702 01:51:17.150879 2244 server.go:455] "Adding debug handlers to kubelet server" Jul 2 01:51:17.150000 audit[2257]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:17.150000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea604e30 a2=0 a3=1 items=0 ppid=2244 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:17.150000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 01:51:17.152195 kubelet[2244]: I0702 01:51:17.152144 2244 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 01:51:17.152530 kubelet[2244]: I0702 01:51:17.152515 2244 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 01:51:17.153747 kubelet[2244]: E0702 01:51:17.153728 2244 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 01:51:17.153964 kubelet[2244]: I0702 01:51:17.153954 2244 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 01:51:17.154127 kubelet[2244]: I0702 01:51:17.154115 2244 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Jul 2 01:51:17.156637 kubelet[2244]: I0702 01:51:17.156616 2244 reconciler.go:26] "Reconciler: start to sync state" Jul 2 01:51:17.157128 kubelet[2244]: W0702 01:51:17.157092 2244 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.20.43:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:17.157236 kubelet[2244]: E0702 01:51:17.157224 2244 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.43:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:17.157374 kubelet[2244]: E0702 01:51:17.157352 2244 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-118aa0dcdb?timeout=10s\": dial tcp 10.200.20.43:6443: connect: connection refused" interval="200ms" Jul 2 01:51:17.156000 audit[2259]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:17.156000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff70afcd0 a2=0 a3=1 items=0 ppid=2244 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:17.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 01:51:17.157931 kubelet[2244]: I0702 01:51:17.157911 2244 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 01:51:17.159076 kubelet[2244]: I0702 01:51:17.159058 2244 factory.go:221] Registration of the containerd container factory successfully Jul 2 01:51:17.159176 kubelet[2244]: I0702 01:51:17.159166 2244 factory.go:221] Registration of the systemd container factory successfully Jul 2 01:51:17.163000 audit[2261]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:17.163000 audit[2261]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe2b06460 a2=0 a3=1 items=0 ppid=2244 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:17.163000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 01:51:17.203095 kubelet[2244]: I0702 01:51:17.203027 2244 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 01:51:17.203095 kubelet[2244]: I0702 01:51:17.203053 2244 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 01:51:17.203095 kubelet[2244]: I0702 01:51:17.203075 2244 state_mem.go:36] "Initialized new in-memory state store" Jul 2 01:51:17.208254 kubelet[2244]: I0702 01:51:17.208213 2244 policy_none.go:49] "None policy: Start" Jul 2 01:51:17.209272 kubelet[2244]: I0702 01:51:17.209222 2244 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 01:51:17.209272 kubelet[2244]: I0702 01:51:17.209257 2244 state_mem.go:35] "Initializing new in-memory state store" Jul 2 01:51:17.218804 systemd[1]: Created slice kubepods.slice. Jul 2 01:51:17.224043 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 01:51:17.227226 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 01:51:17.235566 kubelet[2244]: I0702 01:51:17.235537 2244 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 01:51:17.235000 audit[2244]: AVC avc: denied { mac_admin } for pid=2244 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:17.235000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:51:17.235000 audit[2244]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000767d40 a1=40009f61e0 a2=4000767d10 a3=25 items=0 ppid=1 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:17.235000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:51:17.238438 kubelet[2244]: I0702 01:51:17.238416 2244 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 01:51:17.238848 kubelet[2244]: I0702 01:51:17.238801 2244 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 2 01:51:17.239126 kubelet[2244]: I0702 01:51:17.239116 2244 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 01:51:17.242290 kubelet[2244]: E0702 01:51:17.242265 2244 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.5-a-118aa0dcdb\" not found" Jul 2 01:51:17.243000 audit[2266]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:17.243000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe2d72be0 a2=0 a3=1 items=0 ppid=2244 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:17.243000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 01:51:17.245049 kubelet[2244]: I0702 01:51:17.245010 2244 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 01:51:17.245000 audit[2267]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:17.245000 audit[2267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd252a470 a2=0 a3=1 items=0 ppid=2244 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:17.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 01:51:17.246558 kubelet[2244]: I0702 01:51:17.246538 2244 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 01:51:17.246656 kubelet[2244]: I0702 01:51:17.246647 2244 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 01:51:17.246907 kubelet[2244]: I0702 01:51:17.246895 2244 kubelet.go:2337] "Starting kubelet main sync loop" Jul 2 01:51:17.247084 kubelet[2244]: E0702 01:51:17.247069 2244 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 2 01:51:17.247000 audit[2269]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:17.247000 audit[2269]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff486d250 a2=0 a3=1 items=0 ppid=2244 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:17.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 01:51:17.247000 audit[2268]: NETFILTER_CFG table=mangle:36 family=2 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:17.247000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffea751c50 a2=0 a3=1 items=0 ppid=2244 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:17.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 01:51:17.248705 kubelet[2244]: W0702 01:51:17.248662 2244 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.20.43:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:17.248807 kubelet[2244]: E0702 01:51:17.248795 2244 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.43:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:17.249000 audit[2270]: NETFILTER_CFG table=nat:37 family=10 entries=2 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:17.249000 audit[2270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffed2172b0 a2=0 a3=1 items=0 ppid=2244 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:17.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 01:51:17.250000 audit[2272]: NETFILTER_CFG table=filter:38 family=10 entries=2 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:17.250000 audit[2272]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffeeb1b6c0 a2=0 a3=1 items=0 ppid=2244 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:17.250000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 01:51:17.250000 audit[2271]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:17.250000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf3c19a0 a2=0 a3=1 items=0 ppid=2244 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:17.250000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 01:51:17.252000 audit[2274]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:17.252000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff6ca2fb0 a2=0 a3=1 items=0 ppid=2244 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:17.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 01:51:17.255644 kubelet[2244]: I0702 01:51:17.255588 2244 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:17.256114 kubelet[2244]: E0702 01:51:17.256061 2244 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.20.43:6443/api/v1/nodes\": dial tcp 10.200.20.43:6443: connect: connection refused" node="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:17.347891 kubelet[2244]: I0702 01:51:17.347797 2244 topology_manager.go:215] "Topology Admit Handler" podUID="7b14b2c3f73ddd0d3aa5591cb3304dc6" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:17.350065 kubelet[2244]: I0702 01:51:17.350037 2244 topology_manager.go:215] "Topology Admit Handler" podUID="7842479ffa7b0af543655adba8597da7" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:17.351523 kubelet[2244]: I0702 01:51:17.351468 2244 topology_manager.go:215] "Topology Admit Handler" podUID="e2cbbebbcd2963d9d3b7119223865864" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:17.358571 kubelet[2244]: E0702 01:51:17.358404 2244 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-118aa0dcdb?timeout=10s\": dial tcp 10.200.20.43:6443: connect: connection refused" interval="400ms" Jul 2 01:51:17.358673 systemd[1]: Created slice kubepods-burstable-pod7b14b2c3f73ddd0d3aa5591cb3304dc6.slice. Jul 2 01:51:17.361680 kubelet[2244]: I0702 01:51:17.361638 2244 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7b14b2c3f73ddd0d3aa5591cb3304dc6-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.5-a-118aa0dcdb\" (UID: \"7b14b2c3f73ddd0d3aa5591cb3304dc6\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:17.361680 kubelet[2244]: I0702 01:51:17.361679 2244 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7842479ffa7b0af543655adba8597da7-ca-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-118aa0dcdb\" (UID: \"7842479ffa7b0af543655adba8597da7\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:17.361833 kubelet[2244]: I0702 01:51:17.361701 2244 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7842479ffa7b0af543655adba8597da7-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-118aa0dcdb\" (UID: \"7842479ffa7b0af543655adba8597da7\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:17.361833 kubelet[2244]: I0702 01:51:17.361721 2244 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7842479ffa7b0af543655adba8597da7-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.5-a-118aa0dcdb\" (UID: \"7842479ffa7b0af543655adba8597da7\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:17.361833 kubelet[2244]: I0702 01:51:17.361738 2244 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7842479ffa7b0af543655adba8597da7-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.5-a-118aa0dcdb\" (UID: \"7842479ffa7b0af543655adba8597da7\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:17.361833 kubelet[2244]: I0702 01:51:17.361754 2244 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e2cbbebbcd2963d9d3b7119223865864-kubeconfig\") pod \"kube-scheduler-ci-3510.3.5-a-118aa0dcdb\" (UID: \"e2cbbebbcd2963d9d3b7119223865864\") " pod="kube-system/kube-scheduler-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:17.361833 kubelet[2244]: I0702 01:51:17.361772 2244 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7b14b2c3f73ddd0d3aa5591cb3304dc6-ca-certs\") pod \"kube-apiserver-ci-3510.3.5-a-118aa0dcdb\" (UID: \"7b14b2c3f73ddd0d3aa5591cb3304dc6\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:17.361946 kubelet[2244]: I0702 01:51:17.361787 2244 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7842479ffa7b0af543655adba8597da7-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.5-a-118aa0dcdb\" (UID: \"7842479ffa7b0af543655adba8597da7\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:17.361946 kubelet[2244]: I0702 01:51:17.361801 2244 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7b14b2c3f73ddd0d3aa5591cb3304dc6-k8s-certs\") pod \"kube-apiserver-ci-3510.3.5-a-118aa0dcdb\" (UID: \"7b14b2c3f73ddd0d3aa5591cb3304dc6\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:17.388524 systemd[1]: Created slice kubepods-burstable-pod7842479ffa7b0af543655adba8597da7.slice. Jul 2 01:51:17.392931 systemd[1]: Created slice kubepods-burstable-pode2cbbebbcd2963d9d3b7119223865864.slice. Jul 2 01:51:17.458004 kubelet[2244]: I0702 01:51:17.457922 2244 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:17.458385 kubelet[2244]: E0702 01:51:17.458356 2244 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.20.43:6443/api/v1/nodes\": dial tcp 10.200.20.43:6443: connect: connection refused" node="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:17.687749 env[1471]: time="2024-07-02T01:51:17.687622666Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.5-a-118aa0dcdb,Uid:7b14b2c3f73ddd0d3aa5591cb3304dc6,Namespace:kube-system,Attempt:0,}" Jul 2 01:51:17.692383 env[1471]: time="2024-07-02T01:51:17.692307127Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.5-a-118aa0dcdb,Uid:7842479ffa7b0af543655adba8597da7,Namespace:kube-system,Attempt:0,}" Jul 2 01:51:17.695518 env[1471]: time="2024-07-02T01:51:17.695422847Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.5-a-118aa0dcdb,Uid:e2cbbebbcd2963d9d3b7119223865864,Namespace:kube-system,Attempt:0,}" Jul 2 01:51:17.762062 kubelet[2244]: E0702 01:51:17.761978 2244 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-118aa0dcdb?timeout=10s\": dial tcp 10.200.20.43:6443: connect: connection refused" interval="800ms" Jul 2 01:51:17.860296 kubelet[2244]: I0702 01:51:17.860268 2244 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:17.860862 kubelet[2244]: E0702 01:51:17.860797 2244 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.20.43:6443/api/v1/nodes\": dial tcp 10.200.20.43:6443: connect: connection refused" node="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:18.386810 kubelet[2244]: W0702 01:51:18.386750 2244 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.20.43:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:18.387169 kubelet[2244]: E0702 01:51:18.387155 2244 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.43:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:18.403175 kubelet[2244]: W0702 01:51:18.403141 2244 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.20.43:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:18.403324 kubelet[2244]: E0702 01:51:18.403314 2244 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.43:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:18.562986 kubelet[2244]: E0702 01:51:18.562941 2244 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-118aa0dcdb?timeout=10s\": dial tcp 10.200.20.43:6443: connect: connection refused" interval="1.6s" Jul 2 01:51:18.608607 kubelet[2244]: W0702 01:51:18.608553 2244 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.20.43:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-118aa0dcdb&limit=500&resourceVersion=0": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:18.608794 kubelet[2244]: E0702 01:51:18.608783 2244 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.43:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-118aa0dcdb&limit=500&resourceVersion=0": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:18.811772 kubelet[2244]: W0702 01:51:18.639164 2244 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.20.43:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:18.811772 kubelet[2244]: E0702 01:51:18.639268 2244 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.43:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:18.811772 kubelet[2244]: I0702 01:51:18.662889 2244 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:18.811772 kubelet[2244]: E0702 01:51:18.663223 2244 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.20.43:6443/api/v1/nodes\": dial tcp 10.200.20.43:6443: connect: connection refused" node="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:19.171378 kubelet[2244]: E0702 01:51:19.171345 2244 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.43:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.43:6443: connect: connection refused Jul 2 01:51:19.283334 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1662548491.mount: Deactivated successfully. Jul 2 01:51:19.317970 env[1471]: time="2024-07-02T01:51:19.317911318Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:19.340126 env[1471]: time="2024-07-02T01:51:19.340080459Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:19.347521 env[1471]: time="2024-07-02T01:51:19.347477334Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:19.358567 env[1471]: time="2024-07-02T01:51:19.358520939Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:19.362147 env[1471]: time="2024-07-02T01:51:19.362105541Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:19.369950 env[1471]: time="2024-07-02T01:51:19.369906351Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:19.373934 env[1471]: time="2024-07-02T01:51:19.373841800Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:19.377014 env[1471]: time="2024-07-02T01:51:19.376968780Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:19.380495 env[1471]: time="2024-07-02T01:51:19.380438607Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:19.385160 env[1471]: time="2024-07-02T01:51:19.385121957Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:19.400921 env[1471]: time="2024-07-02T01:51:19.400880116Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:19.406608 env[1471]: time="2024-07-02T01:51:19.406567521Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:19.513118 env[1471]: time="2024-07-02T01:51:19.512467805Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:51:19.513118 env[1471]: time="2024-07-02T01:51:19.512571939Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:51:19.513118 env[1471]: time="2024-07-02T01:51:19.512583500Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:51:19.513819 env[1471]: time="2024-07-02T01:51:19.513775940Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/27b7940ce6ae74c009042054ad4b6184cfb53c2fc7283fe7ff2d667ee9b9aea1 pid=2283 runtime=io.containerd.runc.v2 Jul 2 01:51:19.533227 systemd[1]: Started cri-containerd-27b7940ce6ae74c009042054ad4b6184cfb53c2fc7283fe7ff2d667ee9b9aea1.scope. Jul 2 01:51:19.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.550000 audit: BPF prog-id=56 op=LOAD Jul 2 01:51:19.551000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.551000 audit[2293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2283 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237623739343063653661653734633030393034323035346164346236 Jul 2 01:51:19.551000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.551000 audit[2293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2283 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237623739343063653661653734633030393034323035346164346236 Jul 2 01:51:19.551000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.551000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.551000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.551000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.551000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.551000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.551000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.551000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.551000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.551000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.551000 audit: BPF prog-id=57 op=LOAD Jul 2 01:51:19.551000 audit[2293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2283 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237623739343063653661653734633030393034323035346164346236 Jul 2 01:51:19.552000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.552000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.552000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.552000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.552000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.552000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.552000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.552000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.552000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.552000 audit: BPF prog-id=58 op=LOAD Jul 2 01:51:19.552000 audit[2293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2283 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237623739343063653661653734633030393034323035346164346236 Jul 2 01:51:19.553000 audit: BPF prog-id=58 op=UNLOAD Jul 2 01:51:19.553000 audit: BPF prog-id=57 op=UNLOAD Jul 2 01:51:19.553000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.553000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.553000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.553000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.553000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.553000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.553000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.553000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.553000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.553000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.553000 audit: BPF prog-id=59 op=LOAD Jul 2 01:51:19.553000 audit[2293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2283 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237623739343063653661653734633030393034323035346164346236 Jul 2 01:51:19.564855 env[1471]: time="2024-07-02T01:51:19.561512681Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:51:19.564855 env[1471]: time="2024-07-02T01:51:19.561562328Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:51:19.564855 env[1471]: time="2024-07-02T01:51:19.561572689Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:51:19.564855 env[1471]: time="2024-07-02T01:51:19.561701866Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ba34a54d167ae3a82c0d679d6248ddc5f52e45523d31c08e59df7ab63a2a6f12 pid=2321 runtime=io.containerd.runc.v2 Jul 2 01:51:19.574389 env[1471]: time="2024-07-02T01:51:19.574292360Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:51:19.574389 env[1471]: time="2024-07-02T01:51:19.574384692Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:51:19.574589 env[1471]: time="2024-07-02T01:51:19.574411056Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:51:19.574762 env[1471]: time="2024-07-02T01:51:19.574719057Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55685407b3b0e00c79f8750426eac2d7a1c17f29a08f4be8b35491ea6ea0471d pid=2335 runtime=io.containerd.runc.v2 Jul 2 01:51:19.579195 env[1471]: time="2024-07-02T01:51:19.579148053Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.5-a-118aa0dcdb,Uid:7b14b2c3f73ddd0d3aa5591cb3304dc6,Namespace:kube-system,Attempt:0,} returns sandbox id \"27b7940ce6ae74c009042054ad4b6184cfb53c2fc7283fe7ff2d667ee9b9aea1\"" Jul 2 01:51:19.583543 env[1471]: time="2024-07-02T01:51:19.583504119Z" level=info msg="CreateContainer within sandbox \"27b7940ce6ae74c009042054ad4b6184cfb53c2fc7283fe7ff2d667ee9b9aea1\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 2 01:51:19.592573 systemd[1]: Started cri-containerd-ba34a54d167ae3a82c0d679d6248ddc5f52e45523d31c08e59df7ab63a2a6f12.scope. Jul 2 01:51:19.601045 systemd[1]: Started cri-containerd-55685407b3b0e00c79f8750426eac2d7a1c17f29a08f4be8b35491ea6ea0471d.scope. Jul 2 01:51:19.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.616000 audit: BPF prog-id=60 op=LOAD Jul 2 01:51:19.617000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.617000 audit[2336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2321 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333461353464313637616533613832633064363739643632343864 Jul 2 01:51:19.618000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.618000 audit[2336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2321 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333461353464313637616533613832633064363739643632343864 Jul 2 01:51:19.618000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.618000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.618000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.618000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.618000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.618000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.618000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.618000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.618000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.618000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.618000 audit: BPF prog-id=61 op=LOAD Jul 2 01:51:19.618000 audit[2336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2321 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333461353464313637616533613832633064363739643632343864 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit: BPF prog-id=62 op=LOAD Jul 2 01:51:19.619000 audit[2336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2321 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333461353464313637616533613832633064363739643632343864 Jul 2 01:51:19.619000 audit: BPF prog-id=62 op=UNLOAD Jul 2 01:51:19.619000 audit: BPF prog-id=61 op=UNLOAD Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.619000 audit: BPF prog-id=63 op=LOAD Jul 2 01:51:19.619000 audit[2336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2321 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333461353464313637616533613832633064363739643632343864 Jul 2 01:51:19.623362 env[1471]: time="2024-07-02T01:51:19.623165293Z" level=info msg="CreateContainer within sandbox \"27b7940ce6ae74c009042054ad4b6184cfb53c2fc7283fe7ff2d667ee9b9aea1\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"3446c10ee868af33f3a0c9e92884bdb14bfa153b077651d93db43f280f8e57dc\"" Jul 2 01:51:19.624685 env[1471]: time="2024-07-02T01:51:19.624654253Z" level=info msg="StartContainer for \"3446c10ee868af33f3a0c9e92884bdb14bfa153b077651d93db43f280f8e57dc\"" Jul 2 01:51:19.643152 systemd[1]: Started cri-containerd-3446c10ee868af33f3a0c9e92884bdb14bfa153b077651d93db43f280f8e57dc.scope. Jul 2 01:51:19.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.647000 audit: BPF prog-id=64 op=LOAD Jul 2 01:51:19.649000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.649000 audit[2360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2335 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363835343037623362306530306337396638373530343236656163 Jul 2 01:51:19.651000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.651000 audit[2360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2335 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363835343037623362306530306337396638373530343236656163 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit: BPF prog-id=65 op=LOAD Jul 2 01:51:19.652000 audit[2360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2335 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363835343037623362306530306337396638373530343236656163 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.652000 audit: BPF prog-id=66 op=LOAD Jul 2 01:51:19.652000 audit[2360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2335 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363835343037623362306530306337396638373530343236656163 Jul 2 01:51:19.653000 audit: BPF prog-id=66 op=UNLOAD Jul 2 01:51:19.653000 audit: BPF prog-id=65 op=UNLOAD Jul 2 01:51:19.653000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.653000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.653000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.653000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.653000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.653000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.653000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.653000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.653000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.653000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.653000 audit: BPF prog-id=67 op=LOAD Jul 2 01:51:19.653000 audit[2360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2335 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363835343037623362306530306337396638373530343236656163 Jul 2 01:51:19.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.663000 audit: BPF prog-id=68 op=LOAD Jul 2 01:51:19.664000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.664000 audit[2393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2283 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334343663313065653836386166333366336130633965393238383462 Jul 2 01:51:19.664000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.664000 audit[2393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2283 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334343663313065653836386166333366336130633965393238383462 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit: BPF prog-id=69 op=LOAD Jul 2 01:51:19.667000 audit[2393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2283 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334343663313065653836386166333366336130633965393238383462 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit: BPF prog-id=70 op=LOAD Jul 2 01:51:19.667000 audit[2393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2283 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334343663313065653836386166333366336130633965393238383462 Jul 2 01:51:19.667000 audit: BPF prog-id=70 op=UNLOAD Jul 2 01:51:19.667000 audit: BPF prog-id=69 op=UNLOAD Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.667000 audit: BPF prog-id=71 op=LOAD Jul 2 01:51:19.667000 audit[2393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2283 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334343663313065653836386166333366336130633965393238383462 Jul 2 01:51:19.677405 env[1471]: time="2024-07-02T01:51:19.677340699Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.5-a-118aa0dcdb,Uid:7842479ffa7b0af543655adba8597da7,Namespace:kube-system,Attempt:0,} returns sandbox id \"ba34a54d167ae3a82c0d679d6248ddc5f52e45523d31c08e59df7ab63a2a6f12\"" Jul 2 01:51:19.682251 env[1471]: time="2024-07-02T01:51:19.682216835Z" level=info msg="CreateContainer within sandbox \"ba34a54d167ae3a82c0d679d6248ddc5f52e45523d31c08e59df7ab63a2a6f12\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 2 01:51:19.697468 env[1471]: time="2024-07-02T01:51:19.697400877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.5-a-118aa0dcdb,Uid:e2cbbebbcd2963d9d3b7119223865864,Namespace:kube-system,Attempt:0,} returns sandbox id \"55685407b3b0e00c79f8750426eac2d7a1c17f29a08f4be8b35491ea6ea0471d\"" Jul 2 01:51:19.703233 env[1471]: time="2024-07-02T01:51:19.703172374Z" level=info msg="CreateContainer within sandbox \"55685407b3b0e00c79f8750426eac2d7a1c17f29a08f4be8b35491ea6ea0471d\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 2 01:51:19.722852 env[1471]: time="2024-07-02T01:51:19.720713853Z" level=info msg="StartContainer for \"3446c10ee868af33f3a0c9e92884bdb14bfa153b077651d93db43f280f8e57dc\" returns successfully" Jul 2 01:51:19.735573 env[1471]: time="2024-07-02T01:51:19.735520324Z" level=info msg="CreateContainer within sandbox \"ba34a54d167ae3a82c0d679d6248ddc5f52e45523d31c08e59df7ab63a2a6f12\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"d7a28e675aa28c5b0ff4314c8869312405896b666e65a9d511815206bec6be6f\"" Jul 2 01:51:19.736584 env[1471]: time="2024-07-02T01:51:19.736554223Z" level=info msg="StartContainer for \"d7a28e675aa28c5b0ff4314c8869312405896b666e65a9d511815206bec6be6f\"" Jul 2 01:51:19.752741 env[1471]: time="2024-07-02T01:51:19.752692234Z" level=info msg="CreateContainer within sandbox \"55685407b3b0e00c79f8750426eac2d7a1c17f29a08f4be8b35491ea6ea0471d\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"53de41a1e1ad344b140ace82c44bfb1e6c59579124657ecc213a7ef2b61ab9c9\"" Jul 2 01:51:19.753584 env[1471]: time="2024-07-02T01:51:19.753553230Z" level=info msg="StartContainer for \"53de41a1e1ad344b140ace82c44bfb1e6c59579124657ecc213a7ef2b61ab9c9\"" Jul 2 01:51:19.763578 systemd[1]: Started cri-containerd-d7a28e675aa28c5b0ff4314c8869312405896b666e65a9d511815206bec6be6f.scope. Jul 2 01:51:19.787857 systemd[1]: Started cri-containerd-53de41a1e1ad344b140ace82c44bfb1e6c59579124657ecc213a7ef2b61ab9c9.scope. Jul 2 01:51:19.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.790000 audit: BPF prog-id=72 op=LOAD Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2321 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437613238653637356161323863356230666634333134633838363933 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2321 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437613238653637356161323863356230666634333134633838363933 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit: BPF prog-id=73 op=LOAD Jul 2 01:51:19.791000 audit[2441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2321 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437613238653637356161323863356230666634333134633838363933 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit: BPF prog-id=74 op=LOAD Jul 2 01:51:19.791000 audit[2441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2321 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437613238653637356161323863356230666634333134633838363933 Jul 2 01:51:19.791000 audit: BPF prog-id=74 op=UNLOAD Jul 2 01:51:19.791000 audit: BPF prog-id=73 op=UNLOAD Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.791000 audit: BPF prog-id=75 op=LOAD Jul 2 01:51:19.791000 audit[2441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2321 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437613238653637356161323863356230666634333134633838363933 Jul 2 01:51:19.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.828000 audit: BPF prog-id=76 op=LOAD Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2335 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533646534316131653161643334346231343061636538326334346266 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2335 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533646534316131653161643334346231343061636538326334346266 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit: BPF prog-id=77 op=LOAD Jul 2 01:51:19.829000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2335 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533646534316131653161643334346231343061636538326334346266 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit: BPF prog-id=78 op=LOAD Jul 2 01:51:19.829000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2335 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533646534316131653161643334346231343061636538326334346266 Jul 2 01:51:19.829000 audit: BPF prog-id=78 op=UNLOAD Jul 2 01:51:19.829000 audit: BPF prog-id=77 op=UNLOAD Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:19.829000 audit: BPF prog-id=79 op=LOAD Jul 2 01:51:19.829000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2335 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:19.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533646534316131653161643334346231343061636538326334346266 Jul 2 01:51:19.838559 env[1471]: time="2024-07-02T01:51:19.838470691Z" level=info msg="StartContainer for \"d7a28e675aa28c5b0ff4314c8869312405896b666e65a9d511815206bec6be6f\" returns successfully" Jul 2 01:51:19.887194 env[1471]: time="2024-07-02T01:51:19.887096791Z" level=info msg="StartContainer for \"53de41a1e1ad344b140ace82c44bfb1e6c59579124657ecc213a7ef2b61ab9c9\" returns successfully" Jul 2 01:51:20.265530 kubelet[2244]: I0702 01:51:20.265470 2244 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:20.278832 systemd[1]: run-containerd-runc-k8s.io-27b7940ce6ae74c009042054ad4b6184cfb53c2fc7283fe7ff2d667ee9b9aea1-runc.8jo3w4.mount: Deactivated successfully. Jul 2 01:51:21.695141 kernel: kauditd_printk_skb: 599 callbacks suppressed Jul 2 01:51:21.695291 kernel: audit: type=1400 audit(1719885081.667:534): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:21.667000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:21.667000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000382c00 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:51:21.732197 kernel: audit: type=1300 audit(1719885081.667:534): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000382c00 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:51:21.667000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:21.768582 kernel: audit: type=1327 audit(1719885081.667:534): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:21.675000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:21.789633 kernel: audit: type=1400 audit(1719885081.675:535): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:21.675000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000150de0 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:51:21.817553 kernel: audit: type=1300 audit(1719885081.675:535): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000150de0 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:51:21.675000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:21.840790 kernel: audit: type=1327 audit(1719885081.675:535): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:22.138000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:22.138000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4005f25fb0 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:51:22.195638 kernel: audit: type=1400 audit(1719885082.138:536): avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:22.195740 kernel: audit: type=1300 audit(1719885082.138:536): arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4005f25fb0 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:51:22.138000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:51:22.234662 kernel: audit: type=1327 audit(1719885082.138:536): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:51:22.138000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521029 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:22.256413 kernel: audit: type=1400 audit(1719885082.138:537): avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521029 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:22.138000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4004134030 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:51:22.138000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:51:22.143000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:22.143000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=40041342d0 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:51:22.143000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:51:22.148000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:22.148000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=4008acdd00 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:51:22.148000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:51:22.284000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:22.284000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=44 a1=4009816520 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:51:22.284000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:51:22.284000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:22.284000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=44 a1=4004fd0a80 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:51:22.284000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:51:22.339709 kubelet[2244]: E0702 01:51:22.339671 2244 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.5-a-118aa0dcdb\" not found" node="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:22.364281 kubelet[2244]: I0702 01:51:22.364214 2244 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:23.162337 kubelet[2244]: I0702 01:51:23.162306 2244 apiserver.go:52] "Watching apiserver" Jul 2 01:51:23.255239 kubelet[2244]: I0702 01:51:23.255183 2244 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Jul 2 01:51:23.335747 kubelet[2244]: W0702 01:51:23.335715 2244 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 01:51:24.256180 systemd[1]: Reloading. Jul 2 01:51:24.364664 /usr/lib/systemd/system-generators/torcx-generator[2528]: time="2024-07-02T01:51:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 01:51:24.365085 /usr/lib/systemd/system-generators/torcx-generator[2528]: time="2024-07-02T01:51:24Z" level=info msg="torcx already run" Jul 2 01:51:24.461568 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 01:51:24.461591 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 01:51:24.478093 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 01:51:24.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.569000 audit: BPF prog-id=80 op=LOAD Jul 2 01:51:24.569000 audit: BPF prog-id=56 op=UNLOAD Jul 2 01:51:24.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.570000 audit: BPF prog-id=81 op=LOAD Jul 2 01:51:24.570000 audit: BPF prog-id=41 op=UNLOAD Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit: BPF prog-id=82 op=LOAD Jul 2 01:51:24.571000 audit: BPF prog-id=72 op=UNLOAD Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.571000 audit: BPF prog-id=83 op=LOAD Jul 2 01:51:24.571000 audit: BPF prog-id=42 op=UNLOAD Jul 2 01:51:24.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit: BPF prog-id=84 op=LOAD Jul 2 01:51:24.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.572000 audit: BPF prog-id=85 op=LOAD Jul 2 01:51:24.572000 audit: BPF prog-id=43 op=UNLOAD Jul 2 01:51:24.572000 audit: BPF prog-id=44 op=UNLOAD Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit: BPF prog-id=86 op=LOAD Jul 2 01:51:24.573000 audit: BPF prog-id=45 op=UNLOAD Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit: BPF prog-id=87 op=LOAD Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.573000 audit: BPF prog-id=88 op=LOAD Jul 2 01:51:24.573000 audit: BPF prog-id=46 op=UNLOAD Jul 2 01:51:24.573000 audit: BPF prog-id=47 op=UNLOAD Jul 2 01:51:24.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.574000 audit: BPF prog-id=89 op=LOAD Jul 2 01:51:24.574000 audit: BPF prog-id=48 op=UNLOAD Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit: BPF prog-id=90 op=LOAD Jul 2 01:51:24.575000 audit: BPF prog-id=76 op=UNLOAD Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.575000 audit: BPF prog-id=91 op=LOAD Jul 2 01:51:24.576000 audit: BPF prog-id=49 op=UNLOAD Jul 2 01:51:24.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.578000 audit: BPF prog-id=92 op=LOAD Jul 2 01:51:24.578000 audit: BPF prog-id=60 op=UNLOAD Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit: BPF prog-id=93 op=LOAD Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit: BPF prog-id=94 op=LOAD Jul 2 01:51:24.579000 audit: BPF prog-id=50 op=UNLOAD Jul 2 01:51:24.579000 audit: BPF prog-id=51 op=UNLOAD Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.579000 audit: BPF prog-id=95 op=LOAD Jul 2 01:51:24.579000 audit: BPF prog-id=68 op=UNLOAD Jul 2 01:51:24.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.580000 audit: BPF prog-id=96 op=LOAD Jul 2 01:51:24.580000 audit: BPF prog-id=52 op=UNLOAD Jul 2 01:51:24.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit: BPF prog-id=97 op=LOAD Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit: BPF prog-id=98 op=LOAD Jul 2 01:51:24.581000 audit: BPF prog-id=53 op=UNLOAD Jul 2 01:51:24.581000 audit: BPF prog-id=54 op=UNLOAD Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.581000 audit: BPF prog-id=99 op=LOAD Jul 2 01:51:24.581000 audit: BPF prog-id=55 op=UNLOAD Jul 2 01:51:24.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.582000 audit: BPF prog-id=100 op=LOAD Jul 2 01:51:24.582000 audit: BPF prog-id=64 op=UNLOAD Jul 2 01:51:24.605579 kubelet[2244]: E0702 01:51:24.602827 2244 event.go:319] "Unable to write event (broadcaster is shut down)" event="&Event{ObjectMeta:{ci-3510.3.5-a-118aa0dcdb.17de425d85439114 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.5-a-118aa0dcdb,UID:ci-3510.3.5-a-118aa0dcdb,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.5-a-118aa0dcdb,},FirstTimestamp:2024-07-02 01:51:17.137297684 +0000 UTC m=+1.089962415,LastTimestamp:2024-07-02 01:51:17.137297684 +0000 UTC m=+1.089962415,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.5-a-118aa0dcdb,}" Jul 2 01:51:24.603323 systemd[1]: Stopping kubelet.service... Jul 2 01:51:24.626861 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 01:51:24.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:24.627049 systemd[1]: Stopped kubelet.service. Jul 2 01:51:24.627110 systemd[1]: kubelet.service: Consumed 1.427s CPU time. Jul 2 01:51:24.629628 systemd[1]: Starting kubelet.service... Jul 2 01:51:24.717393 systemd[1]: Started kubelet.service. Jul 2 01:51:24.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:24.767000 kubelet[2592]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 01:51:24.767000 kubelet[2592]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 01:51:24.767000 kubelet[2592]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 01:51:24.767371 kubelet[2592]: I0702 01:51:24.767039 2592 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 01:51:24.771941 kubelet[2592]: I0702 01:51:24.771909 2592 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Jul 2 01:51:24.772152 kubelet[2592]: I0702 01:51:24.772141 2592 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 01:51:24.772426 kubelet[2592]: I0702 01:51:24.772412 2592 server.go:927] "Client rotation is on, will bootstrap in background" Jul 2 01:51:24.774059 kubelet[2592]: I0702 01:51:24.774036 2592 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 2 01:51:24.775731 kubelet[2592]: I0702 01:51:24.775685 2592 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 01:51:24.783833 kubelet[2592]: I0702 01:51:24.783805 2592 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 01:51:24.784238 kubelet[2592]: I0702 01:51:24.784211 2592 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 01:51:24.784531 kubelet[2592]: I0702 01:51:24.784298 2592 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.5-a-118aa0dcdb","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 01:51:24.784676 kubelet[2592]: I0702 01:51:24.784664 2592 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 01:51:24.784730 kubelet[2592]: I0702 01:51:24.784723 2592 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 01:51:24.784860 kubelet[2592]: I0702 01:51:24.784851 2592 state_mem.go:36] "Initialized new in-memory state store" Jul 2 01:51:24.785028 kubelet[2592]: I0702 01:51:24.785017 2592 kubelet.go:400] "Attempting to sync node with API server" Jul 2 01:51:24.785096 kubelet[2592]: I0702 01:51:24.785087 2592 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 01:51:24.785180 kubelet[2592]: I0702 01:51:24.785171 2592 kubelet.go:312] "Adding apiserver pod source" Jul 2 01:51:24.785242 kubelet[2592]: I0702 01:51:24.785234 2592 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 01:51:24.792773 kubelet[2592]: I0702 01:51:24.792747 2592 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 01:51:24.793113 kubelet[2592]: I0702 01:51:24.793100 2592 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 01:51:24.793574 kubelet[2592]: I0702 01:51:24.793560 2592 server.go:1264] "Started kubelet" Jul 2 01:51:24.796631 kubelet[2592]: I0702 01:51:24.796577 2592 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 01:51:24.796841 kubelet[2592]: I0702 01:51:24.796827 2592 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 01:51:24.796956 kubelet[2592]: I0702 01:51:24.796948 2592 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 01:51:24.796000 audit[2592]: AVC avc: denied { mac_admin } for pid=2592 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.796000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:51:24.796000 audit[2592]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008decf0 a1=40007e2f30 a2=40008decc0 a3=25 items=0 ppid=1 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:24.796000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:51:24.796000 audit[2592]: AVC avc: denied { mac_admin } for pid=2592 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:24.796000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:51:24.796000 audit[2592]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008b8740 a1=40007e2f48 a2=40008ded80 a3=25 items=0 ppid=1 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:24.796000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:51:24.809685 kubelet[2592]: I0702 01:51:24.809638 2592 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 01:51:24.810203 kubelet[2592]: I0702 01:51:24.810151 2592 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 01:51:24.810905 kubelet[2592]: I0702 01:51:24.810883 2592 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 01:51:24.812545 kubelet[2592]: I0702 01:51:24.812525 2592 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 01:51:24.813946 kubelet[2592]: I0702 01:51:24.813930 2592 server.go:455] "Adding debug handlers to kubelet server" Jul 2 01:51:24.817993 kubelet[2592]: I0702 01:51:24.817963 2592 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Jul 2 01:51:24.818326 kubelet[2592]: I0702 01:51:24.818315 2592 reconciler.go:26] "Reconciler: start to sync state" Jul 2 01:51:24.835519 kubelet[2592]: I0702 01:51:24.835000 2592 factory.go:221] Registration of the systemd container factory successfully Jul 2 01:51:24.835519 kubelet[2592]: I0702 01:51:24.835134 2592 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 01:51:24.840345 kubelet[2592]: E0702 01:51:24.839935 2592 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 01:51:24.842219 kubelet[2592]: I0702 01:51:24.842111 2592 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 01:51:24.843441 kubelet[2592]: I0702 01:51:24.843361 2592 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 01:51:24.843441 kubelet[2592]: I0702 01:51:24.843426 2592 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 01:51:24.843441 kubelet[2592]: I0702 01:51:24.843442 2592 kubelet.go:2337] "Starting kubelet main sync loop" Jul 2 01:51:24.843637 kubelet[2592]: E0702 01:51:24.843506 2592 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 01:51:24.847856 kubelet[2592]: I0702 01:51:24.847613 2592 factory.go:221] Registration of the containerd container factory successfully Jul 2 01:51:24.902022 kubelet[2592]: I0702 01:51:24.901963 2592 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 01:51:24.902022 kubelet[2592]: I0702 01:51:24.901982 2592 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 01:51:24.902022 kubelet[2592]: I0702 01:51:24.902016 2592 state_mem.go:36] "Initialized new in-memory state store" Jul 2 01:51:26.031981 kubelet[2592]: I0702 01:51:24.902181 2592 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 2 01:51:26.031981 kubelet[2592]: I0702 01:51:24.902192 2592 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 2 01:51:26.031981 kubelet[2592]: I0702 01:51:24.902210 2592 policy_none.go:49] "None policy: Start" Jul 2 01:51:26.031981 kubelet[2592]: I0702 01:51:24.903064 2592 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 01:51:26.031981 kubelet[2592]: I0702 01:51:24.903084 2592 state_mem.go:35] "Initializing new in-memory state store" Jul 2 01:51:26.031981 kubelet[2592]: I0702 01:51:24.915642 2592 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:26.031981 kubelet[2592]: I0702 01:51:24.924527 2592 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:26.031981 kubelet[2592]: E0702 01:51:24.943790 2592 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Jul 2 01:51:26.031981 kubelet[2592]: E0702 01:51:25.144383 2592 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Jul 2 01:51:26.031981 kubelet[2592]: E0702 01:51:25.544499 2592 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Jul 2 01:51:26.031981 kubelet[2592]: I0702 01:51:25.790120 2592 apiserver.go:52] "Watching apiserver" Jul 2 01:51:26.031981 kubelet[2592]: I0702 01:51:26.023657 2592 state_mem.go:75] "Updated machine memory state" Jul 2 01:51:26.032425 kubelet[2592]: I0702 01:51:26.032407 2592 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:26.032711 kubelet[2592]: I0702 01:51:26.032696 2592 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 01:51:26.032000 audit[2592]: AVC avc: denied { mac_admin } for pid=2592 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:26.032000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 01:51:26.032000 audit[2592]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bd4d50 a1=4000f4f488 a2=4000bd4d20 a3=25 items=0 ppid=1 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:26.032000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 01:51:26.033240 kubelet[2592]: I0702 01:51:26.033223 2592 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 01:51:26.033505 kubelet[2592]: I0702 01:51:26.033417 2592 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 2 01:51:26.033679 kubelet[2592]: I0702 01:51:26.033667 2592 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 01:51:26.345695 kubelet[2592]: I0702 01:51:26.345604 2592 topology_manager.go:215] "Topology Admit Handler" podUID="7b14b2c3f73ddd0d3aa5591cb3304dc6" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:26.345829 kubelet[2592]: I0702 01:51:26.345737 2592 topology_manager.go:215] "Topology Admit Handler" podUID="7842479ffa7b0af543655adba8597da7" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:26.345829 kubelet[2592]: I0702 01:51:26.345775 2592 topology_manager.go:215] "Topology Admit Handler" podUID="e2cbbebbcd2963d9d3b7119223865864" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:26.358311 kubelet[2592]: W0702 01:51:26.358287 2592 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 01:51:26.370615 kubelet[2592]: W0702 01:51:26.370582 2592 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 01:51:26.418967 kubelet[2592]: I0702 01:51:26.418940 2592 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Jul 2 01:51:26.427472 kubelet[2592]: I0702 01:51:26.427386 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7b14b2c3f73ddd0d3aa5591cb3304dc6-ca-certs\") pod \"kube-apiserver-ci-3510.3.5-a-118aa0dcdb\" (UID: \"7b14b2c3f73ddd0d3aa5591cb3304dc6\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:26.427472 kubelet[2592]: I0702 01:51:26.427435 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7842479ffa7b0af543655adba8597da7-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-118aa0dcdb\" (UID: \"7842479ffa7b0af543655adba8597da7\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:26.427472 kubelet[2592]: I0702 01:51:26.427471 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7842479ffa7b0af543655adba8597da7-ca-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-118aa0dcdb\" (UID: \"7842479ffa7b0af543655adba8597da7\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:26.427737 kubelet[2592]: I0702 01:51:26.427488 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7842479ffa7b0af543655adba8597da7-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.5-a-118aa0dcdb\" (UID: \"7842479ffa7b0af543655adba8597da7\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:26.427737 kubelet[2592]: I0702 01:51:26.427505 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7842479ffa7b0af543655adba8597da7-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.5-a-118aa0dcdb\" (UID: \"7842479ffa7b0af543655adba8597da7\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:26.427737 kubelet[2592]: I0702 01:51:26.427521 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7842479ffa7b0af543655adba8597da7-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.5-a-118aa0dcdb\" (UID: \"7842479ffa7b0af543655adba8597da7\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:26.427737 kubelet[2592]: I0702 01:51:26.427549 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e2cbbebbcd2963d9d3b7119223865864-kubeconfig\") pod \"kube-scheduler-ci-3510.3.5-a-118aa0dcdb\" (UID: \"e2cbbebbcd2963d9d3b7119223865864\") " pod="kube-system/kube-scheduler-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:26.427737 kubelet[2592]: I0702 01:51:26.427570 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7b14b2c3f73ddd0d3aa5591cb3304dc6-k8s-certs\") pod \"kube-apiserver-ci-3510.3.5-a-118aa0dcdb\" (UID: \"7b14b2c3f73ddd0d3aa5591cb3304dc6\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:26.427851 kubelet[2592]: I0702 01:51:26.427589 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7b14b2c3f73ddd0d3aa5591cb3304dc6-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.5-a-118aa0dcdb\" (UID: \"7b14b2c3f73ddd0d3aa5591cb3304dc6\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-118aa0dcdb" Jul 2 01:51:26.438307 kubelet[2592]: I0702 01:51:26.438248 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.5-a-118aa0dcdb" podStartSLOduration=3.438215465 podStartE2EDuration="3.438215465s" podCreationTimestamp="2024-07-02 01:51:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 01:51:26.41373362 +0000 UTC m=+1.690302279" watchObservedRunningTime="2024-07-02 01:51:26.438215465 +0000 UTC m=+1.714784164" Jul 2 01:51:26.467120 kubelet[2592]: I0702 01:51:26.467068 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.5-a-118aa0dcdb" podStartSLOduration=0.467050408 podStartE2EDuration="467.050408ms" podCreationTimestamp="2024-07-02 01:51:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 01:51:26.450506073 +0000 UTC m=+1.727074772" watchObservedRunningTime="2024-07-02 01:51:26.467050408 +0000 UTC m=+1.743619107" Jul 2 01:51:26.699547 kubelet[2592]: I0702 01:51:26.699359 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.5-a-118aa0dcdb" podStartSLOduration=0.699323901 podStartE2EDuration="699.323901ms" podCreationTimestamp="2024-07-02 01:51:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 01:51:26.467876743 +0000 UTC m=+1.744445442" watchObservedRunningTime="2024-07-02 01:51:26.699323901 +0000 UTC m=+1.975892600" Jul 2 01:51:30.537375 sudo[1900]: pam_unix(sudo:session): session closed for user root Jul 2 01:51:30.535000 audit[1900]: USER_END pid=1900 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:51:30.542653 kernel: kauditd_printk_skb: 272 callbacks suppressed Jul 2 01:51:30.542725 kernel: audit: type=1106 audit(1719885090.535:791): pid=1900 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:51:30.536000 audit[1900]: CRED_DISP pid=1900 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:51:30.580593 kernel: audit: type=1104 audit(1719885090.536:792): pid=1900 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:51:30.612815 sshd[1887]: pam_unix(sshd:session): session closed for user core Jul 2 01:51:30.612000 audit[1887]: USER_END pid=1887 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:51:30.638212 systemd[1]: sshd@6-10.200.20.43:22-10.200.16.10:39818.service: Deactivated successfully. Jul 2 01:51:30.638961 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 01:51:30.639118 systemd[1]: session-9.scope: Consumed 7.251s CPU time. Jul 2 01:51:30.612000 audit[1887]: CRED_DISP pid=1887 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:51:30.658755 kernel: audit: type=1106 audit(1719885090.612:793): pid=1887 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:51:30.658883 kernel: audit: type=1104 audit(1719885090.612:794): pid=1887 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:51:30.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.43:22-10.200.16.10:39818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:30.678141 kernel: audit: type=1131 audit(1719885090.636:795): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.43:22-10.200.16.10:39818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:51:30.678197 systemd-logind[1455]: Session 9 logged out. Waiting for processes to exit. Jul 2 01:51:30.679106 systemd-logind[1455]: Removed session 9. Jul 2 01:51:36.609000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521060 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 01:51:36.609000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000b6b500 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:51:36.661969 kernel: audit: type=1400 audit(1719885096.609:796): avc: denied { watch } for pid=2459 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521060 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 01:51:36.662092 kernel: audit: type=1300 audit(1719885096.609:796): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000b6b500 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:51:36.609000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:36.685932 kernel: audit: type=1327 audit(1719885096.609:796): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:37.604000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:37.623000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:37.648838 kernel: audit: type=1400 audit(1719885097.604:797): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:37.648943 kernel: audit: type=1400 audit(1719885097.623:798): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:37.623000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000a98e80 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:51:37.692033 kernel: audit: type=1300 audit(1719885097.623:798): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000a98e80 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:51:37.623000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:37.623000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:37.735678 kernel: audit: type=1327 audit(1719885097.623:798): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:37.735763 kernel: audit: type=1400 audit(1719885097.623:799): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:37.623000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000a98f00 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:51:37.763550 kernel: audit: type=1300 audit(1719885097.623:799): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000a98f00 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:51:37.623000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:37.786199 kernel: audit: type=1327 audit(1719885097.623:799): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:37.623000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:51:37.623000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000a98f80 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:51:37.623000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:37.604000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a5fd60 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:51:37.604000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:51:40.430359 kubelet[2592]: I0702 01:51:40.430323 2592 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 2 01:51:40.431282 env[1471]: time="2024-07-02T01:51:40.431224473Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 01:51:40.431698 kubelet[2592]: I0702 01:51:40.431683 2592 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 2 01:51:41.117228 kubelet[2592]: I0702 01:51:41.117190 2592 topology_manager.go:215] "Topology Admit Handler" podUID="cc19c244-9496-465f-8f40-f2790a563b79" podNamespace="kube-system" podName="kube-proxy-vm78z" Jul 2 01:51:41.123388 systemd[1]: Created slice kubepods-besteffort-podcc19c244_9496_465f_8f40_f2790a563b79.slice. Jul 2 01:51:41.232291 kubelet[2592]: I0702 01:51:41.232252 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/cc19c244-9496-465f-8f40-f2790a563b79-kube-proxy\") pod \"kube-proxy-vm78z\" (UID: \"cc19c244-9496-465f-8f40-f2790a563b79\") " pod="kube-system/kube-proxy-vm78z" Jul 2 01:51:41.232548 kubelet[2592]: I0702 01:51:41.232531 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cc19c244-9496-465f-8f40-f2790a563b79-xtables-lock\") pod \"kube-proxy-vm78z\" (UID: \"cc19c244-9496-465f-8f40-f2790a563b79\") " pod="kube-system/kube-proxy-vm78z" Jul 2 01:51:41.232645 kubelet[2592]: I0702 01:51:41.232631 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cc19c244-9496-465f-8f40-f2790a563b79-lib-modules\") pod \"kube-proxy-vm78z\" (UID: \"cc19c244-9496-465f-8f40-f2790a563b79\") " pod="kube-system/kube-proxy-vm78z" Jul 2 01:51:41.232758 kubelet[2592]: I0702 01:51:41.232741 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hbjmd\" (UniqueName: \"kubernetes.io/projected/cc19c244-9496-465f-8f40-f2790a563b79-kube-api-access-hbjmd\") pod \"kube-proxy-vm78z\" (UID: \"cc19c244-9496-465f-8f40-f2790a563b79\") " pod="kube-system/kube-proxy-vm78z" Jul 2 01:51:41.430572 env[1471]: time="2024-07-02T01:51:41.430114019Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vm78z,Uid:cc19c244-9496-465f-8f40-f2790a563b79,Namespace:kube-system,Attempt:0,}" Jul 2 01:51:41.476052 env[1471]: time="2024-07-02T01:51:41.475907557Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:51:41.476052 env[1471]: time="2024-07-02T01:51:41.475950121Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:51:41.476052 env[1471]: time="2024-07-02T01:51:41.475960402Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:51:41.476630 env[1471]: time="2024-07-02T01:51:41.476546491Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e98ea8ec2c4a0fdc470c790a2a69470e6744d5a8aced0b927e329cd27a5c5e73 pid=2677 runtime=io.containerd.runc.v2 Jul 2 01:51:41.510405 systemd[1]: Started cri-containerd-e98ea8ec2c4a0fdc470c790a2a69470e6744d5a8aced0b927e329cd27a5c5e73.scope. Jul 2 01:51:41.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.527000 audit: BPF prog-id=101 op=LOAD Jul 2 01:51:41.529922 kubelet[2592]: I0702 01:51:41.529881 2592 topology_manager.go:215] "Topology Admit Handler" podUID="d0413f3b-5939-4de3-821f-f931c4f00988" podNamespace="tigera-operator" podName="tigera-operator-76ff79f7fd-wsh7t" Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2677 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539386561386563326334613066646334373063373930613261363934 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2677 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539386561386563326334613066646334373063373930613261363934 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit: BPF prog-id=102 op=LOAD Jul 2 01:51:41.529000 audit[2688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2677 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539386561386563326334613066646334373063373930613261363934 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit: BPF prog-id=103 op=LOAD Jul 2 01:51:41.529000 audit[2688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2677 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539386561386563326334613066646334373063373930613261363934 Jul 2 01:51:41.529000 audit: BPF prog-id=103 op=UNLOAD Jul 2 01:51:41.529000 audit: BPF prog-id=102 op=UNLOAD Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.529000 audit: BPF prog-id=104 op=LOAD Jul 2 01:51:41.529000 audit[2688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2677 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539386561386563326334613066646334373063373930613261363934 Jul 2 01:51:41.536936 systemd[1]: Created slice kubepods-besteffort-podd0413f3b_5939_4de3_821f_f931c4f00988.slice. Jul 2 01:51:41.561742 env[1471]: time="2024-07-02T01:51:41.560572050Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vm78z,Uid:cc19c244-9496-465f-8f40-f2790a563b79,Namespace:kube-system,Attempt:0,} returns sandbox id \"e98ea8ec2c4a0fdc470c790a2a69470e6744d5a8aced0b927e329cd27a5c5e73\"" Jul 2 01:51:41.566792 env[1471]: time="2024-07-02T01:51:41.566751810Z" level=info msg="CreateContainer within sandbox \"e98ea8ec2c4a0fdc470c790a2a69470e6744d5a8aced0b927e329cd27a5c5e73\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 01:51:41.611658 env[1471]: time="2024-07-02T01:51:41.611609909Z" level=info msg="CreateContainer within sandbox \"e98ea8ec2c4a0fdc470c790a2a69470e6744d5a8aced0b927e329cd27a5c5e73\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d48cf0616f1a9bda588a913c550d3b5331513549e027ac660504d94cf1663cb4\"" Jul 2 01:51:41.612647 env[1471]: time="2024-07-02T01:51:41.612619595Z" level=info msg="StartContainer for \"d48cf0616f1a9bda588a913c550d3b5331513549e027ac660504d94cf1663cb4\"" Jul 2 01:51:41.631446 systemd[1]: Started cri-containerd-d48cf0616f1a9bda588a913c550d3b5331513549e027ac660504d94cf1663cb4.scope. Jul 2 01:51:41.637525 kubelet[2592]: I0702 01:51:41.637285 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mlgm9\" (UniqueName: \"kubernetes.io/projected/d0413f3b-5939-4de3-821f-f931c4f00988-kube-api-access-mlgm9\") pod \"tigera-operator-76ff79f7fd-wsh7t\" (UID: \"d0413f3b-5939-4de3-821f-f931c4f00988\") " pod="tigera-operator/tigera-operator-76ff79f7fd-wsh7t" Jul 2 01:51:41.637525 kubelet[2592]: I0702 01:51:41.637324 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d0413f3b-5939-4de3-821f-f931c4f00988-var-lib-calico\") pod \"tigera-operator-76ff79f7fd-wsh7t\" (UID: \"d0413f3b-5939-4de3-821f-f931c4f00988\") " pod="tigera-operator/tigera-operator-76ff79f7fd-wsh7t" Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.654389 kernel: kauditd_printk_skb: 62 callbacks suppressed Jul 2 01:51:41.668963 kernel: audit: type=1400 audit(1719885101.647:819): avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.719229 kernel: audit: type=1300 audit(1719885101.647:819): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2677 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.719343 kernel: audit: type=1327 audit(1719885101.647:819): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434386366303631366631613962646135383861393133633535306433 Jul 2 01:51:41.647000 audit[2719]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2677 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434386366303631366631613962646135383861393133633535306433 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.740995 kernel: audit: type=1400 audit(1719885101.647:820): avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.758497 kernel: audit: type=1400 audit(1719885101.647:820): avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.774928 kernel: audit: type=1400 audit(1719885101.647:820): avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.792930 kernel: audit: type=1400 audit(1719885101.647:820): avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.826060 kernel: audit: type=1400 audit(1719885101.647:820): avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.826140 kernel: audit: type=1400 audit(1719885101.647:820): avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.842534 kernel: audit: type=1400 audit(1719885101.647:820): avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.842608 env[1471]: time="2024-07-02T01:51:41.826410646Z" level=info msg="StartContainer for \"d48cf0616f1a9bda588a913c550d3b5331513549e027ac660504d94cf1663cb4\" returns successfully" Jul 2 01:51:41.842608 env[1471]: time="2024-07-02T01:51:41.839837577Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76ff79f7fd-wsh7t,Uid:d0413f3b-5939-4de3-821f-f931c4f00988,Namespace:tigera-operator,Attempt:0,}" Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit: BPF prog-id=105 op=LOAD Jul 2 01:51:41.647000 audit[2719]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2677 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434386366303631366631613962646135383861393133633535306433 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit: BPF prog-id=106 op=LOAD Jul 2 01:51:41.647000 audit[2719]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2677 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434386366303631366631613962646135383861393133633535306433 Jul 2 01:51:41.647000 audit: BPF prog-id=106 op=UNLOAD Jul 2 01:51:41.647000 audit: BPF prog-id=105 op=UNLOAD Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.647000 audit: BPF prog-id=107 op=LOAD Jul 2 01:51:41.647000 audit[2719]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2677 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434386366303631366631613962646135383861393133633535306433 Jul 2 01:51:41.873000 audit[2770]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:41.873000 audit[2770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffda6de320 a2=0 a3=1 items=0 ppid=2729 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.873000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 01:51:41.874000 audit[2771]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:41.874000 audit[2771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe81a6fc0 a2=0 a3=1 items=0 ppid=2729 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 01:51:41.877000 audit[2772]: NETFILTER_CFG table=mangle:43 family=10 entries=1 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:41.877000 audit[2772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe7e73d40 a2=0 a3=1 items=0 ppid=2729 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.877000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 01:51:41.878000 audit[2773]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:41.878000 audit[2773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcc6e20c0 a2=0 a3=1 items=0 ppid=2729 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.878000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 01:51:41.878000 audit[2774]: NETFILTER_CFG table=nat:45 family=10 entries=1 op=nft_register_chain pid=2774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:41.878000 audit[2774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd4d7b240 a2=0 a3=1 items=0 ppid=2729 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.878000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 01:51:41.886000 audit[2775]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:41.886000 audit[2775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd9866a10 a2=0 a3=1 items=0 ppid=2729 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.886000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 01:51:41.896659 env[1471]: time="2024-07-02T01:51:41.896566196Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:51:41.896659 env[1471]: time="2024-07-02T01:51:41.896641642Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:51:41.896857 env[1471]: time="2024-07-02T01:51:41.896667484Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:51:41.897004 env[1471]: time="2024-07-02T01:51:41.896939587Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/53669b317529703d05f67509cdd398d5c6487e318970619b007843c85c8a9326 pid=2784 runtime=io.containerd.runc.v2 Jul 2 01:51:41.911180 systemd[1]: Started cri-containerd-53669b317529703d05f67509cdd398d5c6487e318970619b007843c85c8a9326.scope. Jul 2 01:51:41.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.927000 audit: BPF prog-id=108 op=LOAD Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400019db38 a2=10 a3=0 items=0 ppid=2784 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533363639623331373532393730336430356636373530396364643339 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=2784 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533363639623331373532393730336430356636373530396364643339 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit: BPF prog-id=109 op=LOAD Jul 2 01:51:41.928000 audit[2794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=2784 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533363639623331373532393730336430356636373530396364643339 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit: BPF prog-id=110 op=LOAD Jul 2 01:51:41.928000 audit[2794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=2784 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533363639623331373532393730336430356636373530396364643339 Jul 2 01:51:41.928000 audit: BPF prog-id=110 op=UNLOAD Jul 2 01:51:41.928000 audit: BPF prog-id=109 op=UNLOAD Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:41.928000 audit: BPF prog-id=111 op=LOAD Jul 2 01:51:41.928000 audit[2794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=2784 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533363639623331373532393730336430356636373530396364643339 Jul 2 01:51:41.951028 env[1471]: time="2024-07-02T01:51:41.950952218Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76ff79f7fd-wsh7t,Uid:d0413f3b-5939-4de3-821f-f931c4f00988,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"53669b317529703d05f67509cdd398d5c6487e318970619b007843c85c8a9326\"" Jul 2 01:51:41.953515 env[1471]: time="2024-07-02T01:51:41.952818295Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\"" Jul 2 01:51:41.981000 audit[2817]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2817 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:41.981000 audit[2817]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd665a600 a2=0 a3=1 items=0 ppid=2729 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.981000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 01:51:41.986000 audit[2819]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:41.986000 audit[2819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffec7ce210 a2=0 a3=1 items=0 ppid=2729 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.986000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 01:51:41.990000 audit[2822]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2822 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:41.990000 audit[2822]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffee015f10 a2=0 a3=1 items=0 ppid=2729 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.990000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 01:51:41.991000 audit[2823]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:41.991000 audit[2823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe21b56b0 a2=0 a3=1 items=0 ppid=2729 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.991000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 01:51:41.993000 audit[2825]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2825 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:41.993000 audit[2825]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffeb6a20b0 a2=0 a3=1 items=0 ppid=2729 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.993000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 01:51:41.995000 audit[2826]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2826 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:41.995000 audit[2826]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdc2759c0 a2=0 a3=1 items=0 ppid=2729 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.995000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 01:51:41.998000 audit[2828]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2828 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:41.998000 audit[2828]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff7271ec0 a2=0 a3=1 items=0 ppid=2729 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:41.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 01:51:42.002000 audit[2831]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2831 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:42.002000 audit[2831]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff2e661c0 a2=0 a3=1 items=0 ppid=2729 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 01:51:42.003000 audit[2832]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:42.003000 audit[2832]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdebba4f0 a2=0 a3=1 items=0 ppid=2729 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.003000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 01:51:42.006000 audit[2834]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2834 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:42.006000 audit[2834]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd0699820 a2=0 a3=1 items=0 ppid=2729 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.006000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 01:51:42.007000 audit[2835]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2835 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:42.007000 audit[2835]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff780f810 a2=0 a3=1 items=0 ppid=2729 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 01:51:42.010000 audit[2837]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2837 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:42.010000 audit[2837]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe59f2490 a2=0 a3=1 items=0 ppid=2729 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 01:51:42.014000 audit[2840]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:42.014000 audit[2840]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd0f22e00 a2=0 a3=1 items=0 ppid=2729 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.014000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 01:51:42.018000 audit[2843]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:42.018000 audit[2843]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe5195b00 a2=0 a3=1 items=0 ppid=2729 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 01:51:42.019000 audit[2844]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2844 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:42.019000 audit[2844]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd97d98d0 a2=0 a3=1 items=0 ppid=2729 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 01:51:42.021000 audit[2846]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:42.021000 audit[2846]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=fffff781a840 a2=0 a3=1 items=0 ppid=2729 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 01:51:42.024000 audit[2849]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:42.024000 audit[2849]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffbefd4e0 a2=0 a3=1 items=0 ppid=2729 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.024000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 01:51:42.025000 audit[2850]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2850 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:42.025000 audit[2850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff7e16b60 a2=0 a3=1 items=0 ppid=2729 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 01:51:42.028000 audit[2852]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 01:51:42.028000 audit[2852]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=fffff82a59e0 a2=0 a3=1 items=0 ppid=2729 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.028000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 01:51:42.097000 audit[2858]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2858 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:42.097000 audit[2858]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffe195b8f0 a2=0 a3=1 items=0 ppid=2729 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.097000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:42.119000 audit[2858]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2858 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:42.119000 audit[2858]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffe195b8f0 a2=0 a3=1 items=0 ppid=2729 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.119000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:42.121000 audit[2863]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.121000 audit[2863]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffecb3b770 a2=0 a3=1 items=0 ppid=2729 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 01:51:42.124000 audit[2865]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2865 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.124000 audit[2865]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff0da5150 a2=0 a3=1 items=0 ppid=2729 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.124000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 01:51:42.128000 audit[2868]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2868 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.128000 audit[2868]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdbbe8490 a2=0 a3=1 items=0 ppid=2729 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.128000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 01:51:42.130000 audit[2869]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2869 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.130000 audit[2869]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffad4cb30 a2=0 a3=1 items=0 ppid=2729 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.130000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 01:51:42.132000 audit[2871]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2871 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.132000 audit[2871]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe2fd7920 a2=0 a3=1 items=0 ppid=2729 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.132000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 01:51:42.134000 audit[2872]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2872 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.134000 audit[2872]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd8070380 a2=0 a3=1 items=0 ppid=2729 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.134000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 01:51:42.136000 audit[2874]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.136000 audit[2874]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe6e45c80 a2=0 a3=1 items=0 ppid=2729 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 01:51:42.141000 audit[2877]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2877 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.141000 audit[2877]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffffa9b0950 a2=0 a3=1 items=0 ppid=2729 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 01:51:42.142000 audit[2878]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2878 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.142000 audit[2878]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe9fdbdc0 a2=0 a3=1 items=0 ppid=2729 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.142000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 01:51:42.144000 audit[2880]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2880 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.144000 audit[2880]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc517e3b0 a2=0 a3=1 items=0 ppid=2729 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.144000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 01:51:42.145000 audit[2881]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2881 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.145000 audit[2881]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdd846750 a2=0 a3=1 items=0 ppid=2729 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.145000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 01:51:42.148000 audit[2883]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2883 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.148000 audit[2883]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc562e560 a2=0 a3=1 items=0 ppid=2729 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.148000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 01:51:42.152000 audit[2886]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2886 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.152000 audit[2886]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc819de00 a2=0 a3=1 items=0 ppid=2729 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.152000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 01:51:42.155000 audit[2889]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2889 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.155000 audit[2889]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff67aa460 a2=0 a3=1 items=0 ppid=2729 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.155000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 01:51:42.156000 audit[2890]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2890 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.156000 audit[2890]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffba3a3a0 a2=0 a3=1 items=0 ppid=2729 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.156000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 01:51:42.158000 audit[2892]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2892 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.158000 audit[2892]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff87f1df0 a2=0 a3=1 items=0 ppid=2729 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.158000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 01:51:42.162000 audit[2895]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2895 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.162000 audit[2895]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffffed28250 a2=0 a3=1 items=0 ppid=2729 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 01:51:42.163000 audit[2896]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2896 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.163000 audit[2896]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe6928540 a2=0 a3=1 items=0 ppid=2729 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.163000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 01:51:42.165000 audit[2898]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2898 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.165000 audit[2898]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffdf905370 a2=0 a3=1 items=0 ppid=2729 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 01:51:42.167000 audit[2899]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2899 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.167000 audit[2899]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc008eef0 a2=0 a3=1 items=0 ppid=2729 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.167000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 01:51:42.169000 audit[2901]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2901 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.169000 audit[2901]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc0eb8c00 a2=0 a3=1 items=0 ppid=2729 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 01:51:42.172000 audit[2904]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 01:51:42.172000 audit[2904]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffd36e8d0 a2=0 a3=1 items=0 ppid=2729 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 01:51:42.175000 audit[2906]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2906 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 01:51:42.175000 audit[2906]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffc8ef89e0 a2=0 a3=1 items=0 ppid=2729 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.175000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:42.176000 audit[2906]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2906 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 01:51:42.176000 audit[2906]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc8ef89e0 a2=0 a3=1 items=0 ppid=2729 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:42.176000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:42.349702 systemd[1]: run-containerd-runc-k8s.io-e98ea8ec2c4a0fdc470c790a2a69470e6744d5a8aced0b927e329cd27a5c5e73-runc.QKXscv.mount: Deactivated successfully. Jul 2 01:51:43.621317 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1569312085.mount: Deactivated successfully. Jul 2 01:51:44.201227 env[1471]: time="2024-07-02T01:51:44.201170750Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:44.211632 env[1471]: time="2024-07-02T01:51:44.211566259Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5886f48e233edcb89c0e8e3cdbdc40101f3c2dfbe67d7717f01d19c27cd78f92,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:44.214792 env[1471]: time="2024-07-02T01:51:44.214765754Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:44.218733 env[1471]: time="2024-07-02T01:51:44.218705628Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:479ddc7ff9ab095058b96f6710bbf070abada86332e267d6e5dcc1df36ba2cc5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:44.219295 env[1471]: time="2024-07-02T01:51:44.219240191Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\" returns image reference \"sha256:5886f48e233edcb89c0e8e3cdbdc40101f3c2dfbe67d7717f01d19c27cd78f92\"" Jul 2 01:51:44.223832 env[1471]: time="2024-07-02T01:51:44.223800355Z" level=info msg="CreateContainer within sandbox \"53669b317529703d05f67509cdd398d5c6487e318970619b007843c85c8a9326\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 2 01:51:44.260258 env[1471]: time="2024-07-02T01:51:44.260184295Z" level=info msg="CreateContainer within sandbox \"53669b317529703d05f67509cdd398d5c6487e318970619b007843c85c8a9326\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"5b394df8f756b7cd1db9651ce5f7510eed2cd296a4eab6c50599268a56e83cdc\"" Jul 2 01:51:44.261100 env[1471]: time="2024-07-02T01:51:44.260935515Z" level=info msg="StartContainer for \"5b394df8f756b7cd1db9651ce5f7510eed2cd296a4eab6c50599268a56e83cdc\"" Jul 2 01:51:44.280273 systemd[1]: Started cri-containerd-5b394df8f756b7cd1db9651ce5f7510eed2cd296a4eab6c50599268a56e83cdc.scope. Jul 2 01:51:44.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.291000 audit: BPF prog-id=112 op=LOAD Jul 2 01:51:44.292000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.292000 audit[2914]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2784 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:44.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333934646638663735366237636431646239363531636535663735 Jul 2 01:51:44.292000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.292000 audit[2914]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2784 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:44.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333934646638663735366237636431646239363531636535663735 Jul 2 01:51:44.292000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.292000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.292000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.292000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.292000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.292000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.292000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.292000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.292000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.292000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.292000 audit: BPF prog-id=113 op=LOAD Jul 2 01:51:44.292000 audit[2914]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2784 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:44.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333934646638663735366237636431646239363531636535663735 Jul 2 01:51:44.293000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.293000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.293000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.293000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.293000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.293000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.293000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.293000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.293000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.293000 audit: BPF prog-id=114 op=LOAD Jul 2 01:51:44.293000 audit[2914]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2784 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:44.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333934646638663735366237636431646239363531636535663735 Jul 2 01:51:44.294000 audit: BPF prog-id=114 op=UNLOAD Jul 2 01:51:44.294000 audit: BPF prog-id=113 op=UNLOAD Jul 2 01:51:44.294000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.294000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.294000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.294000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.294000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.294000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.294000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.294000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.294000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.294000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:44.294000 audit: BPF prog-id=115 op=LOAD Jul 2 01:51:44.294000 audit[2914]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2784 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:44.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333934646638663735366237636431646239363531636535663735 Jul 2 01:51:44.313315 env[1471]: time="2024-07-02T01:51:44.313222604Z" level=info msg="StartContainer for \"5b394df8f756b7cd1db9651ce5f7510eed2cd296a4eab6c50599268a56e83cdc\" returns successfully" Jul 2 01:51:44.854729 kubelet[2592]: I0702 01:51:44.854638 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-vm78z" podStartSLOduration=3.854620209 podStartE2EDuration="3.854620209s" podCreationTimestamp="2024-07-02 01:51:41 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 01:51:41.919087133 +0000 UTC m=+17.195655832" watchObservedRunningTime="2024-07-02 01:51:44.854620209 +0000 UTC m=+20.131188908" Jul 2 01:51:46.608013 kubelet[2592]: I0702 01:51:46.607862 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76ff79f7fd-wsh7t" podStartSLOduration=3.339246616 podStartE2EDuration="5.607844889s" podCreationTimestamp="2024-07-02 01:51:41 +0000 UTC" firstStartedPulling="2024-07-02 01:51:41.952180521 +0000 UTC m=+17.228749220" lastFinishedPulling="2024-07-02 01:51:44.220778794 +0000 UTC m=+19.497347493" observedRunningTime="2024-07-02 01:51:44.920375491 +0000 UTC m=+20.196944190" watchObservedRunningTime="2024-07-02 01:51:46.607844889 +0000 UTC m=+21.884413588" Jul 2 01:51:47.479000 audit[2945]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:47.484970 kernel: kauditd_printk_skb: 300 callbacks suppressed Jul 2 01:51:47.485031 kernel: audit: type=1325 audit(1719885107.479:912): table=filter:92 family=2 entries=15 op=nft_register_rule pid=2945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:47.479000 audit[2945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc3473dd0 a2=0 a3=1 items=0 ppid=2729 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:47.524019 kernel: audit: type=1300 audit(1719885107.479:912): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc3473dd0 a2=0 a3=1 items=0 ppid=2729 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:47.479000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:47.536951 kernel: audit: type=1327 audit(1719885107.479:912): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:47.480000 audit[2945]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:47.550776 kernel: audit: type=1325 audit(1719885107.480:913): table=nat:93 family=2 entries=12 op=nft_register_rule pid=2945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:47.480000 audit[2945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc3473dd0 a2=0 a3=1 items=0 ppid=2729 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:47.576608 kernel: audit: type=1300 audit(1719885107.480:913): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc3473dd0 a2=0 a3=1 items=0 ppid=2729 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:47.480000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:47.589493 kernel: audit: type=1327 audit(1719885107.480:913): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:47.518000 audit[2947]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2947 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:47.604632 kernel: audit: type=1325 audit(1719885107.518:914): table=filter:94 family=2 entries=16 op=nft_register_rule pid=2947 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:47.518000 audit[2947]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffcc2ea1e0 a2=0 a3=1 items=0 ppid=2729 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:47.630513 kernel: audit: type=1300 audit(1719885107.518:914): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffcc2ea1e0 a2=0 a3=1 items=0 ppid=2729 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:47.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:47.645490 kernel: audit: type=1327 audit(1719885107.518:914): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:47.538000 audit[2947]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2947 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:47.664107 kernel: audit: type=1325 audit(1719885107.538:915): table=nat:95 family=2 entries=12 op=nft_register_rule pid=2947 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:47.538000 audit[2947]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffcc2ea1e0 a2=0 a3=1 items=0 ppid=2729 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:47.538000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:47.694210 kubelet[2592]: I0702 01:51:47.694171 2592 topology_manager.go:215] "Topology Admit Handler" podUID="0e07372e-fe9c-4e57-8f34-9753e5469afd" podNamespace="calico-system" podName="calico-typha-769fb9646d-nhxzg" Jul 2 01:51:47.714233 systemd[1]: Created slice kubepods-besteffort-pod0e07372e_fe9c_4e57_8f34_9753e5469afd.slice. Jul 2 01:51:47.860510 kubelet[2592]: I0702 01:51:47.860430 2592 topology_manager.go:215] "Topology Admit Handler" podUID="64d9ecd4-71e0-457a-9e92-9c192a339a7e" podNamespace="calico-system" podName="calico-node-f5lmj" Jul 2 01:51:47.865372 kubelet[2592]: W0702 01:51:47.865308 2592 reflector.go:547] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ci-3510.3.5-a-118aa0dcdb" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.5-a-118aa0dcdb' and this object Jul 2 01:51:47.865372 kubelet[2592]: E0702 01:51:47.865352 2592 reflector.go:150] object-"calico-system"/"cni-config": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ci-3510.3.5-a-118aa0dcdb" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.5-a-118aa0dcdb' and this object Jul 2 01:51:47.865893 kubelet[2592]: W0702 01:51:47.865875 2592 reflector.go:547] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510.3.5-a-118aa0dcdb" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.5-a-118aa0dcdb' and this object Jul 2 01:51:47.865981 kubelet[2592]: E0702 01:51:47.865970 2592 reflector.go:150] object-"calico-system"/"node-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510.3.5-a-118aa0dcdb" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.5-a-118aa0dcdb' and this object Jul 2 01:51:47.866113 systemd[1]: Created slice kubepods-besteffort-pod64d9ecd4_71e0_457a_9e92_9c192a339a7e.slice. Jul 2 01:51:47.877031 kubelet[2592]: I0702 01:51:47.876996 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0e07372e-fe9c-4e57-8f34-9753e5469afd-tigera-ca-bundle\") pod \"calico-typha-769fb9646d-nhxzg\" (UID: \"0e07372e-fe9c-4e57-8f34-9753e5469afd\") " pod="calico-system/calico-typha-769fb9646d-nhxzg" Jul 2 01:51:47.877173 kubelet[2592]: I0702 01:51:47.877159 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/0e07372e-fe9c-4e57-8f34-9753e5469afd-typha-certs\") pod \"calico-typha-769fb9646d-nhxzg\" (UID: \"0e07372e-fe9c-4e57-8f34-9753e5469afd\") " pod="calico-system/calico-typha-769fb9646d-nhxzg" Jul 2 01:51:47.877252 kubelet[2592]: I0702 01:51:47.877239 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k2flc\" (UniqueName: \"kubernetes.io/projected/0e07372e-fe9c-4e57-8f34-9753e5469afd-kube-api-access-k2flc\") pod \"calico-typha-769fb9646d-nhxzg\" (UID: \"0e07372e-fe9c-4e57-8f34-9753e5469afd\") " pod="calico-system/calico-typha-769fb9646d-nhxzg" Jul 2 01:51:47.977618 kubelet[2592]: I0702 01:51:47.977581 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-lib-modules\") pod \"calico-node-f5lmj\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " pod="calico-system/calico-node-f5lmj" Jul 2 01:51:47.977804 kubelet[2592]: I0702 01:51:47.977790 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-var-run-calico\") pod \"calico-node-f5lmj\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " pod="calico-system/calico-node-f5lmj" Jul 2 01:51:47.977887 kubelet[2592]: I0702 01:51:47.977874 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/64d9ecd4-71e0-457a-9e92-9c192a339a7e-node-certs\") pod \"calico-node-f5lmj\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " pod="calico-system/calico-node-f5lmj" Jul 2 01:51:47.977956 kubelet[2592]: I0702 01:51:47.977944 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-var-lib-calico\") pod \"calico-node-f5lmj\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " pod="calico-system/calico-node-f5lmj" Jul 2 01:51:47.978021 kubelet[2592]: I0702 01:51:47.978010 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-xtables-lock\") pod \"calico-node-f5lmj\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " pod="calico-system/calico-node-f5lmj" Jul 2 01:51:47.978101 kubelet[2592]: I0702 01:51:47.978090 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-cni-bin-dir\") pod \"calico-node-f5lmj\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " pod="calico-system/calico-node-f5lmj" Jul 2 01:51:47.978178 kubelet[2592]: I0702 01:51:47.978166 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-54vlq\" (UniqueName: \"kubernetes.io/projected/64d9ecd4-71e0-457a-9e92-9c192a339a7e-kube-api-access-54vlq\") pod \"calico-node-f5lmj\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " pod="calico-system/calico-node-f5lmj" Jul 2 01:51:47.978244 kubelet[2592]: I0702 01:51:47.978233 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-policysync\") pod \"calico-node-f5lmj\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " pod="calico-system/calico-node-f5lmj" Jul 2 01:51:47.978309 kubelet[2592]: I0702 01:51:47.978297 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/64d9ecd4-71e0-457a-9e92-9c192a339a7e-tigera-ca-bundle\") pod \"calico-node-f5lmj\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " pod="calico-system/calico-node-f5lmj" Jul 2 01:51:47.978388 kubelet[2592]: I0702 01:51:47.978377 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-cni-net-dir\") pod \"calico-node-f5lmj\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " pod="calico-system/calico-node-f5lmj" Jul 2 01:51:47.978515 kubelet[2592]: I0702 01:51:47.978440 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-cni-log-dir\") pod \"calico-node-f5lmj\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " pod="calico-system/calico-node-f5lmj" Jul 2 01:51:47.980630 kubelet[2592]: I0702 01:51:47.980599 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-flexvol-driver-host\") pod \"calico-node-f5lmj\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " pod="calico-system/calico-node-f5lmj" Jul 2 01:51:47.982053 kubelet[2592]: I0702 01:51:47.981989 2592 topology_manager.go:215] "Topology Admit Handler" podUID="4b19f760-4591-4466-a6d7-b7bc3509cff0" podNamespace="calico-system" podName="csi-node-driver-m94hx" Jul 2 01:51:47.986247 kubelet[2592]: E0702 01:51:47.986219 2592 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m94hx" podUID="4b19f760-4591-4466-a6d7-b7bc3509cff0" Jul 2 01:51:48.018398 env[1471]: time="2024-07-02T01:51:48.017876495Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-769fb9646d-nhxzg,Uid:0e07372e-fe9c-4e57-8f34-9753e5469afd,Namespace:calico-system,Attempt:0,}" Jul 2 01:51:48.068867 env[1471]: time="2024-07-02T01:51:48.068759998Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:51:48.068867 env[1471]: time="2024-07-02T01:51:48.068812001Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:51:48.068867 env[1471]: time="2024-07-02T01:51:48.068822762Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:51:48.069231 env[1471]: time="2024-07-02T01:51:48.069193710Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13 pid=2958 runtime=io.containerd.runc.v2 Jul 2 01:51:48.082491 kubelet[2592]: I0702 01:51:48.081011 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4b19f760-4591-4466-a6d7-b7bc3509cff0-registration-dir\") pod \"csi-node-driver-m94hx\" (UID: \"4b19f760-4591-4466-a6d7-b7bc3509cff0\") " pod="calico-system/csi-node-driver-m94hx" Jul 2 01:51:48.082491 kubelet[2592]: I0702 01:51:48.081053 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4b19f760-4591-4466-a6d7-b7bc3509cff0-kubelet-dir\") pod \"csi-node-driver-m94hx\" (UID: \"4b19f760-4591-4466-a6d7-b7bc3509cff0\") " pod="calico-system/csi-node-driver-m94hx" Jul 2 01:51:48.082491 kubelet[2592]: I0702 01:51:48.081070 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hm47r\" (UniqueName: \"kubernetes.io/projected/4b19f760-4591-4466-a6d7-b7bc3509cff0-kube-api-access-hm47r\") pod \"csi-node-driver-m94hx\" (UID: \"4b19f760-4591-4466-a6d7-b7bc3509cff0\") " pod="calico-system/csi-node-driver-m94hx" Jul 2 01:51:48.082491 kubelet[2592]: I0702 01:51:48.081138 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4b19f760-4591-4466-a6d7-b7bc3509cff0-socket-dir\") pod \"csi-node-driver-m94hx\" (UID: \"4b19f760-4591-4466-a6d7-b7bc3509cff0\") " pod="calico-system/csi-node-driver-m94hx" Jul 2 01:51:48.082491 kubelet[2592]: I0702 01:51:48.081154 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4b19f760-4591-4466-a6d7-b7bc3509cff0-varrun\") pod \"csi-node-driver-m94hx\" (UID: \"4b19f760-4591-4466-a6d7-b7bc3509cff0\") " pod="calico-system/csi-node-driver-m94hx" Jul 2 01:51:48.089648 systemd[1]: Started cri-containerd-2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13.scope. Jul 2 01:51:48.105491 kubelet[2592]: E0702 01:51:48.105428 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.105491 kubelet[2592]: W0702 01:51:48.105462 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.105491 kubelet[2592]: E0702 01:51:48.105491 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.125000 audit: BPF prog-id=116 op=LOAD Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2958 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:48.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653066636235623935336262306634356332626637633431666164 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2958 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:48.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653066636235623935336262306634356332626637633431666164 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit: BPF prog-id=117 op=LOAD Jul 2 01:51:48.126000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2958 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:48.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653066636235623935336262306634356332626637633431666164 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit: BPF prog-id=118 op=LOAD Jul 2 01:51:48.126000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2958 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:48.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653066636235623935336262306634356332626637633431666164 Jul 2 01:51:48.126000 audit: BPF prog-id=118 op=UNLOAD Jul 2 01:51:48.126000 audit: BPF prog-id=117 op=UNLOAD Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:48.126000 audit: BPF prog-id=119 op=LOAD Jul 2 01:51:48.126000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2958 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:48.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653066636235623935336262306634356332626637633431666164 Jul 2 01:51:48.144909 env[1471]: time="2024-07-02T01:51:48.144833293Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-769fb9646d-nhxzg,Uid:0e07372e-fe9c-4e57-8f34-9753e5469afd,Namespace:calico-system,Attempt:0,} returns sandbox id \"2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13\"" Jul 2 01:51:48.147496 env[1471]: time="2024-07-02T01:51:48.146688911Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\"" Jul 2 01:51:48.181695 kubelet[2592]: E0702 01:51:48.181670 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.181825 kubelet[2592]: W0702 01:51:48.181811 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.181895 kubelet[2592]: E0702 01:51:48.181883 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.182189 kubelet[2592]: E0702 01:51:48.182176 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.182277 kubelet[2592]: W0702 01:51:48.182265 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.182376 kubelet[2592]: E0702 01:51:48.182365 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.182646 kubelet[2592]: E0702 01:51:48.182633 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.182733 kubelet[2592]: W0702 01:51:48.182721 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.182796 kubelet[2592]: E0702 01:51:48.182778 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.183053 kubelet[2592]: E0702 01:51:48.183041 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.183125 kubelet[2592]: W0702 01:51:48.183114 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.183186 kubelet[2592]: E0702 01:51:48.183168 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.183497 kubelet[2592]: E0702 01:51:48.183483 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.183574 kubelet[2592]: W0702 01:51:48.183563 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.183654 kubelet[2592]: E0702 01:51:48.183624 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.183912 kubelet[2592]: E0702 01:51:48.183900 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.183997 kubelet[2592]: W0702 01:51:48.183985 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.184071 kubelet[2592]: E0702 01:51:48.184060 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.184359 kubelet[2592]: E0702 01:51:48.184341 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.184359 kubelet[2592]: W0702 01:51:48.184357 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.184535 kubelet[2592]: E0702 01:51:48.184375 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.184584 kubelet[2592]: E0702 01:51:48.184575 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.184611 kubelet[2592]: W0702 01:51:48.184584 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.184611 kubelet[2592]: E0702 01:51:48.184596 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.184888 kubelet[2592]: E0702 01:51:48.184872 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.184888 kubelet[2592]: W0702 01:51:48.184886 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.184998 kubelet[2592]: E0702 01:51:48.184983 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.185115 kubelet[2592]: E0702 01:51:48.185024 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.185186 kubelet[2592]: W0702 01:51:48.185174 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.185297 kubelet[2592]: E0702 01:51:48.185270 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.185611 kubelet[2592]: E0702 01:51:48.185598 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.185699 kubelet[2592]: W0702 01:51:48.185686 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.185805 kubelet[2592]: E0702 01:51:48.185788 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.186018 kubelet[2592]: E0702 01:51:48.186006 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.186094 kubelet[2592]: W0702 01:51:48.186083 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.186215 kubelet[2592]: E0702 01:51:48.186199 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.186415 kubelet[2592]: E0702 01:51:48.186404 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.186531 kubelet[2592]: W0702 01:51:48.186520 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.186630 kubelet[2592]: E0702 01:51:48.186613 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.186906 kubelet[2592]: E0702 01:51:48.186893 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.186979 kubelet[2592]: W0702 01:51:48.186968 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.187093 kubelet[2592]: E0702 01:51:48.187077 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.187283 kubelet[2592]: E0702 01:51:48.187271 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.187365 kubelet[2592]: W0702 01:51:48.187353 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.187497 kubelet[2592]: E0702 01:51:48.187480 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.187745 kubelet[2592]: E0702 01:51:48.187732 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.187815 kubelet[2592]: W0702 01:51:48.187804 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.187913 kubelet[2592]: E0702 01:51:48.187895 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.188104 kubelet[2592]: E0702 01:51:48.188093 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.188176 kubelet[2592]: W0702 01:51:48.188165 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.188276 kubelet[2592]: E0702 01:51:48.188257 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.188489 kubelet[2592]: E0702 01:51:48.188478 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.188572 kubelet[2592]: W0702 01:51:48.188560 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.188680 kubelet[2592]: E0702 01:51:48.188661 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.188896 kubelet[2592]: E0702 01:51:48.188884 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.188971 kubelet[2592]: W0702 01:51:48.188960 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.189075 kubelet[2592]: E0702 01:51:48.189057 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.189617 kubelet[2592]: E0702 01:51:48.189600 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.189713 kubelet[2592]: W0702 01:51:48.189700 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.189829 kubelet[2592]: E0702 01:51:48.189811 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.190050 kubelet[2592]: E0702 01:51:48.190039 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.190116 kubelet[2592]: W0702 01:51:48.190106 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.190220 kubelet[2592]: E0702 01:51:48.190201 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.190430 kubelet[2592]: E0702 01:51:48.190417 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.190624 kubelet[2592]: W0702 01:51:48.190593 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.190732 kubelet[2592]: E0702 01:51:48.190713 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.190931 kubelet[2592]: E0702 01:51:48.190918 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.190998 kubelet[2592]: W0702 01:51:48.190988 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.191106 kubelet[2592]: E0702 01:51:48.191088 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.191334 kubelet[2592]: E0702 01:51:48.191323 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.191468 kubelet[2592]: W0702 01:51:48.191397 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.191591 kubelet[2592]: E0702 01:51:48.191568 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.191839 kubelet[2592]: E0702 01:51:48.191826 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.191905 kubelet[2592]: W0702 01:51:48.191893 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.192024 kubelet[2592]: E0702 01:51:48.192007 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.193411 kubelet[2592]: E0702 01:51:48.193392 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.193602 kubelet[2592]: W0702 01:51:48.193585 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.199286 kubelet[2592]: E0702 01:51:48.199266 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.204558 kubelet[2592]: E0702 01:51:48.204536 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.204684 kubelet[2592]: W0702 01:51:48.204669 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.204760 kubelet[2592]: E0702 01:51:48.204735 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.284531 kubelet[2592]: E0702 01:51:48.284509 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.284673 kubelet[2592]: W0702 01:51:48.284661 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.284776 kubelet[2592]: E0702 01:51:48.284763 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.389102 kubelet[2592]: E0702 01:51:48.385473 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.389241 kubelet[2592]: W0702 01:51:48.389224 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.389306 kubelet[2592]: E0702 01:51:48.389294 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.490601 kubelet[2592]: E0702 01:51:48.490578 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.490757 kubelet[2592]: W0702 01:51:48.490744 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.490820 kubelet[2592]: E0702 01:51:48.490808 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.591492 kubelet[2592]: E0702 01:51:48.591470 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.591622 kubelet[2592]: W0702 01:51:48.591609 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.591714 kubelet[2592]: E0702 01:51:48.591702 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.635000 audit[3026]: NETFILTER_CFG table=filter:96 family=2 entries=16 op=nft_register_rule pid=3026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:48.635000 audit[3026]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc7552190 a2=0 a3=1 items=0 ppid=2729 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:48.635000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:48.636000 audit[3026]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=3026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:48.636000 audit[3026]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc7552190 a2=0 a3=1 items=0 ppid=2729 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:48.636000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:48.692803 kubelet[2592]: E0702 01:51:48.692783 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.692929 kubelet[2592]: W0702 01:51:48.692917 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.693009 kubelet[2592]: E0702 01:51:48.692998 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.794329 kubelet[2592]: E0702 01:51:48.794306 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.794668 kubelet[2592]: W0702 01:51:48.794652 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.794788 kubelet[2592]: E0702 01:51:48.794773 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.896440 kubelet[2592]: E0702 01:51:48.895960 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.896603 kubelet[2592]: W0702 01:51:48.896584 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.896675 kubelet[2592]: E0702 01:51:48.896659 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.899340 kubelet[2592]: E0702 01:51:48.899325 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:48.899481 kubelet[2592]: W0702 01:51:48.899436 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:48.899567 kubelet[2592]: E0702 01:51:48.899554 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:48.931435 env[1471]: time="2024-07-02T01:51:48.931312917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-f5lmj,Uid:64d9ecd4-71e0-457a-9e92-9c192a339a7e,Namespace:calico-system,Attempt:0,}" Jul 2 01:51:48.971537 env[1471]: time="2024-07-02T01:51:48.971338133Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:51:48.971537 env[1471]: time="2024-07-02T01:51:48.971380816Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:51:48.971537 env[1471]: time="2024-07-02T01:51:48.971391096Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:51:48.971868 env[1471]: time="2024-07-02T01:51:48.971787606Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2 pid=3041 runtime=io.containerd.runc.v2 Jul 2 01:51:48.986648 systemd[1]: run-containerd-runc-k8s.io-2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13-runc.k8NFtt.mount: Deactivated successfully. Jul 2 01:51:49.005907 systemd[1]: run-containerd-runc-k8s.io-2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2-runc.7vWtg8.mount: Deactivated successfully. Jul 2 01:51:49.012978 systemd[1]: Started cri-containerd-2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2.scope. Jul 2 01:51:49.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.028000 audit: BPF prog-id=120 op=LOAD Jul 2 01:51:49.028000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.028000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3041 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:49.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263633937653663323166396236306335643935643264303039316533 Jul 2 01:51:49.028000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.028000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3041 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:49.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263633937653663323166396236306335643935643264303039316533 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit: BPF prog-id=121 op=LOAD Jul 2 01:51:49.029000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3041 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:49.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263633937653663323166396236306335643935643264303039316533 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit: BPF prog-id=122 op=LOAD Jul 2 01:51:49.029000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3041 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:49.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263633937653663323166396236306335643935643264303039316533 Jul 2 01:51:49.029000 audit: BPF prog-id=122 op=UNLOAD Jul 2 01:51:49.029000 audit: BPF prog-id=121 op=UNLOAD Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:49.029000 audit: BPF prog-id=123 op=LOAD Jul 2 01:51:49.029000 audit[3051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3041 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:49.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263633937653663323166396236306335643935643264303039316533 Jul 2 01:51:49.052909 env[1471]: time="2024-07-02T01:51:49.052871770Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-f5lmj,Uid:64d9ecd4-71e0-457a-9e92-9c192a339a7e,Namespace:calico-system,Attempt:0,} returns sandbox id \"2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2\"" Jul 2 01:51:49.667000 audit[3081]: NETFILTER_CFG table=filter:98 family=2 entries=16 op=nft_register_rule pid=3081 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:49.667000 audit[3081]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffe8c134b0 a2=0 a3=1 items=0 ppid=2729 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:49.667000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:49.679000 audit[3081]: NETFILTER_CFG table=nat:99 family=2 entries=12 op=nft_register_rule pid=3081 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:49.679000 audit[3081]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe8c134b0 a2=0 a3=1 items=0 ppid=2729 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:49.679000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:49.844690 kubelet[2592]: E0702 01:51:49.844640 2592 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m94hx" podUID="4b19f760-4591-4466-a6d7-b7bc3509cff0" Jul 2 01:51:50.112938 env[1471]: time="2024-07-02T01:51:50.112888595Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:50.124067 env[1471]: time="2024-07-02T01:51:50.124021155Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2551880d36cd0ce4c6820747ffe4c40cbf344d26df0ecd878808432ad4f78f03,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:50.127704 env[1471]: time="2024-07-02T01:51:50.127666337Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:50.136584 env[1471]: time="2024-07-02T01:51:50.136546976Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:eff1501af12b7e27e2ef8f4e55d03d837bcb017aa5663e22e519059c452d51ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:50.137394 env[1471]: time="2024-07-02T01:51:50.137364274Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\" returns image reference \"sha256:2551880d36cd0ce4c6820747ffe4c40cbf344d26df0ecd878808432ad4f78f03\"" Jul 2 01:51:50.148885 env[1471]: time="2024-07-02T01:51:50.147254745Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 01:51:50.155247 env[1471]: time="2024-07-02T01:51:50.155215518Z" level=info msg="CreateContainer within sandbox \"2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 2 01:51:50.194773 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1912718517.mount: Deactivated successfully. Jul 2 01:51:50.209599 env[1471]: time="2024-07-02T01:51:50.209541943Z" level=info msg="CreateContainer within sandbox \"2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc\"" Jul 2 01:51:50.210409 env[1471]: time="2024-07-02T01:51:50.210381203Z" level=info msg="StartContainer for \"c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc\"" Jul 2 01:51:50.229967 systemd[1]: Started cri-containerd-c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc.scope. Jul 2 01:51:50.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.246000 audit: BPF prog-id=124 op=LOAD Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2958 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:50.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333326664326130343464386664643964303661393539663031656331 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2958 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:50.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333326664326130343464386664643964303661393539663031656331 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit: BPF prog-id=125 op=LOAD Jul 2 01:51:50.247000 audit[3091]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2958 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:50.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333326664326130343464386664643964303661393539663031656331 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit: BPF prog-id=126 op=LOAD Jul 2 01:51:50.247000 audit[3091]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2958 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:50.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333326664326130343464386664643964303661393539663031656331 Jul 2 01:51:50.247000 audit: BPF prog-id=126 op=UNLOAD Jul 2 01:51:50.247000 audit: BPF prog-id=125 op=UNLOAD Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:50.247000 audit: BPF prog-id=127 op=LOAD Jul 2 01:51:50.247000 audit[3091]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2958 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:50.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333326664326130343464386664643964303661393539663031656331 Jul 2 01:51:50.273687 env[1471]: time="2024-07-02T01:51:50.273638911Z" level=info msg="StartContainer for \"c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc\" returns successfully" Jul 2 01:51:50.925416 env[1471]: time="2024-07-02T01:51:50.925373602Z" level=info msg="StopContainer for \"c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc\" with timeout 300 (s)" Jul 2 01:51:50.926140 env[1471]: time="2024-07-02T01:51:50.926099975Z" level=info msg="Stop container \"c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc\" with signal terminated" Jul 2 01:51:50.944436 kubelet[2592]: I0702 01:51:50.944165 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-769fb9646d-nhxzg" podStartSLOduration=1.9518907140000001 podStartE2EDuration="3.944147352s" podCreationTimestamp="2024-07-02 01:51:47 +0000 UTC" firstStartedPulling="2024-07-02 01:51:48.146219716 +0000 UTC m=+23.422788415" lastFinishedPulling="2024-07-02 01:51:50.138476354 +0000 UTC m=+25.415045053" observedRunningTime="2024-07-02 01:51:50.942000998 +0000 UTC m=+26.218569697" watchObservedRunningTime="2024-07-02 01:51:50.944147352 +0000 UTC m=+26.220716051" Jul 2 01:51:50.950000 audit: BPF prog-id=124 op=UNLOAD Jul 2 01:51:50.951240 systemd[1]: cri-containerd-c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc.scope: Deactivated successfully. Jul 2 01:51:50.953000 audit: BPF prog-id=127 op=UNLOAD Jul 2 01:51:51.143203 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc-rootfs.mount: Deactivated successfully. Jul 2 01:51:51.844485 kubelet[2592]: E0702 01:51:51.844429 2592 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m94hx" podUID="4b19f760-4591-4466-a6d7-b7bc3509cff0" Jul 2 01:51:52.536184 env[1471]: time="2024-07-02T01:51:52.535996949Z" level=info msg="shim disconnected" id=c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc Jul 2 01:51:52.536184 env[1471]: time="2024-07-02T01:51:52.536041713Z" level=warning msg="cleaning up after shim disconnected" id=c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc namespace=k8s.io Jul 2 01:51:52.536184 env[1471]: time="2024-07-02T01:51:52.536052513Z" level=info msg="cleaning up dead shim" Jul 2 01:51:52.548044 env[1471]: time="2024-07-02T01:51:52.548003185Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:51:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3138 runtime=io.containerd.runc.v2\n" Jul 2 01:51:52.552975 env[1471]: time="2024-07-02T01:51:52.552935688Z" level=info msg="StopContainer for \"c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc\" returns successfully" Jul 2 01:51:52.553920 env[1471]: time="2024-07-02T01:51:52.553891315Z" level=info msg="StopPodSandbox for \"2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13\"" Jul 2 01:51:52.554015 env[1471]: time="2024-07-02T01:51:52.553951559Z" level=info msg="Container to stop \"c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Jul 2 01:51:52.555813 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13-shm.mount: Deactivated successfully. Jul 2 01:51:52.576754 kernel: kauditd_printk_skb: 187 callbacks suppressed Jul 2 01:51:52.576888 kernel: audit: type=1334 audit(1719885112.562:976): prog-id=116 op=UNLOAD Jul 2 01:51:52.562000 audit: BPF prog-id=116 op=UNLOAD Jul 2 01:51:52.563879 systemd[1]: cri-containerd-2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13.scope: Deactivated successfully. Jul 2 01:51:52.575000 audit: BPF prog-id=119 op=UNLOAD Jul 2 01:51:52.594525 kernel: audit: type=1334 audit(1719885112.575:977): prog-id=119 op=UNLOAD Jul 2 01:51:52.612112 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13-rootfs.mount: Deactivated successfully. Jul 2 01:51:52.632008 env[1471]: time="2024-07-02T01:51:52.631927665Z" level=info msg="shim disconnected" id=2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13 Jul 2 01:51:52.632008 env[1471]: time="2024-07-02T01:51:52.631976469Z" level=warning msg="cleaning up after shim disconnected" id=2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13 namespace=k8s.io Jul 2 01:51:52.632008 env[1471]: time="2024-07-02T01:51:52.631987309Z" level=info msg="cleaning up dead shim" Jul 2 01:51:52.643182 env[1471]: time="2024-07-02T01:51:52.642884068Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:51:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3169 runtime=io.containerd.runc.v2\n" Jul 2 01:51:52.643320 env[1471]: time="2024-07-02T01:51:52.643289736Z" level=info msg="TearDown network for sandbox \"2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13\" successfully" Jul 2 01:51:52.643320 env[1471]: time="2024-07-02T01:51:52.643313777Z" level=info msg="StopPodSandbox for \"2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13\" returns successfully" Jul 2 01:51:52.668940 kubelet[2592]: I0702 01:51:52.668863 2592 topology_manager.go:215] "Topology Admit Handler" podUID="d2553f97-65bf-4efb-8aae-ae996a530b85" podNamespace="calico-system" podName="calico-typha-59544599cb-ct7p4" Jul 2 01:51:52.668940 kubelet[2592]: E0702 01:51:52.668927 2592 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="0e07372e-fe9c-4e57-8f34-9753e5469afd" containerName="calico-typha" Jul 2 01:51:52.669358 kubelet[2592]: I0702 01:51:52.668955 2592 memory_manager.go:354] "RemoveStaleState removing state" podUID="0e07372e-fe9c-4e57-8f34-9753e5469afd" containerName="calico-typha" Jul 2 01:51:52.678636 systemd[1]: Created slice kubepods-besteffort-podd2553f97_65bf_4efb_8aae_ae996a530b85.slice. Jul 2 01:51:52.698000 audit[3184]: NETFILTER_CFG table=filter:100 family=2 entries=16 op=nft_register_rule pid=3184 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:52.715429 kubelet[2592]: E0702 01:51:52.715365 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.715429 kubelet[2592]: W0702 01:51:52.715385 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.715429 kubelet[2592]: E0702 01:51:52.715403 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.715735 kubelet[2592]: E0702 01:51:52.715678 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.715735 kubelet[2592]: W0702 01:51:52.715692 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.715735 kubelet[2592]: E0702 01:51:52.715706 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.715891 kubelet[2592]: E0702 01:51:52.715842 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.715891 kubelet[2592]: W0702 01:51:52.715854 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.715891 kubelet[2592]: E0702 01:51:52.715862 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.716012 kubelet[2592]: E0702 01:51:52.716000 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.716012 kubelet[2592]: W0702 01:51:52.716007 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.716066 kubelet[2592]: E0702 01:51:52.716015 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.716203 kubelet[2592]: E0702 01:51:52.716145 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.716203 kubelet[2592]: W0702 01:51:52.716158 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.716203 kubelet[2592]: E0702 01:51:52.716166 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.716342 kubelet[2592]: E0702 01:51:52.716291 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.716342 kubelet[2592]: W0702 01:51:52.716303 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.716342 kubelet[2592]: E0702 01:51:52.716313 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.716513 kubelet[2592]: E0702 01:51:52.716434 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.716513 kubelet[2592]: W0702 01:51:52.716441 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.716741 kubelet[2592]: E0702 01:51:52.716448 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.716925 kubelet[2592]: E0702 01:51:52.716870 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.716925 kubelet[2592]: W0702 01:51:52.716884 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.716925 kubelet[2592]: E0702 01:51:52.716901 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.717227 kubelet[2592]: E0702 01:51:52.717182 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.717227 kubelet[2592]: W0702 01:51:52.717197 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.717227 kubelet[2592]: E0702 01:51:52.717208 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.717401 kubelet[2592]: E0702 01:51:52.717342 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.717401 kubelet[2592]: W0702 01:51:52.717349 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.717401 kubelet[2592]: E0702 01:51:52.717358 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.717572 kubelet[2592]: E0702 01:51:52.717518 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.717604 kubelet[2592]: W0702 01:51:52.717581 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.717604 kubelet[2592]: E0702 01:51:52.717594 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.717836 kubelet[2592]: E0702 01:51:52.717783 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.717836 kubelet[2592]: W0702 01:51:52.717796 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.717836 kubelet[2592]: E0702 01:51:52.717809 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.698000 audit[3184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffdc187a20 a2=0 a3=1 items=0 ppid=2729 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:52.718627 kernel: audit: type=1325 audit(1719885112.698:978): table=filter:100 family=2 entries=16 op=nft_register_rule pid=3184 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:52.748442 kubelet[2592]: E0702 01:51:52.725224 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.748442 kubelet[2592]: W0702 01:51:52.725239 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.748442 kubelet[2592]: E0702 01:51:52.725269 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.748442 kubelet[2592]: I0702 01:51:52.725298 2592 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/0e07372e-fe9c-4e57-8f34-9753e5469afd-typha-certs\") pod \"0e07372e-fe9c-4e57-8f34-9753e5469afd\" (UID: \"0e07372e-fe9c-4e57-8f34-9753e5469afd\") " Jul 2 01:51:52.748442 kubelet[2592]: E0702 01:51:52.725527 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.748442 kubelet[2592]: W0702 01:51:52.725538 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.748442 kubelet[2592]: E0702 01:51:52.725552 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.748442 kubelet[2592]: I0702 01:51:52.725583 2592 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0e07372e-fe9c-4e57-8f34-9753e5469afd-tigera-ca-bundle\") pod \"0e07372e-fe9c-4e57-8f34-9753e5469afd\" (UID: \"0e07372e-fe9c-4e57-8f34-9753e5469afd\") " Jul 2 01:51:52.748442 kubelet[2592]: E0702 01:51:52.726021 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.730443 systemd[1]: var-lib-kubelet-pods-0e07372e\x2dfe9c\x2d4e57\x2d8f34\x2d9753e5469afd-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Jul 2 01:51:52.748867 kubelet[2592]: W0702 01:51:52.726033 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.748867 kubelet[2592]: E0702 01:51:52.726046 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.748867 kubelet[2592]: I0702 01:51:52.726067 2592 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-k2flc\" (UniqueName: \"kubernetes.io/projected/0e07372e-fe9c-4e57-8f34-9753e5469afd-kube-api-access-k2flc\") pod \"0e07372e-fe9c-4e57-8f34-9753e5469afd\" (UID: \"0e07372e-fe9c-4e57-8f34-9753e5469afd\") " Jul 2 01:51:52.748867 kubelet[2592]: E0702 01:51:52.728824 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.748867 kubelet[2592]: W0702 01:51:52.728841 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.748867 kubelet[2592]: E0702 01:51:52.728867 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.748867 kubelet[2592]: I0702 01:51:52.728891 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d2553f97-65bf-4efb-8aae-ae996a530b85-tigera-ca-bundle\") pod \"calico-typha-59544599cb-ct7p4\" (UID: \"d2553f97-65bf-4efb-8aae-ae996a530b85\") " pod="calico-system/calico-typha-59544599cb-ct7p4" Jul 2 01:51:52.748867 kubelet[2592]: E0702 01:51:52.731424 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.741604 systemd[1]: var-lib-kubelet-pods-0e07372e\x2dfe9c\x2d4e57\x2d8f34\x2d9753e5469afd-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Jul 2 01:51:52.749082 kubelet[2592]: W0702 01:51:52.731437 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.749082 kubelet[2592]: E0702 01:51:52.731465 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.749082 kubelet[2592]: I0702 01:51:52.731485 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d2553f97-65bf-4efb-8aae-ae996a530b85-typha-certs\") pod \"calico-typha-59544599cb-ct7p4\" (UID: \"d2553f97-65bf-4efb-8aae-ae996a530b85\") " pod="calico-system/calico-typha-59544599cb-ct7p4" Jul 2 01:51:52.749082 kubelet[2592]: E0702 01:51:52.731663 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.749082 kubelet[2592]: W0702 01:51:52.731675 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.749082 kubelet[2592]: E0702 01:51:52.731685 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.749082 kubelet[2592]: I0702 01:51:52.731715 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h7cjb\" (UniqueName: \"kubernetes.io/projected/d2553f97-65bf-4efb-8aae-ae996a530b85-kube-api-access-h7cjb\") pod \"calico-typha-59544599cb-ct7p4\" (UID: \"d2553f97-65bf-4efb-8aae-ae996a530b85\") " pod="calico-system/calico-typha-59544599cb-ct7p4" Jul 2 01:51:52.749082 kubelet[2592]: E0702 01:51:52.731925 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.749256 kubelet[2592]: W0702 01:51:52.731935 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.749256 kubelet[2592]: E0702 01:51:52.731945 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.749256 kubelet[2592]: E0702 01:51:52.732109 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.749256 kubelet[2592]: W0702 01:51:52.732119 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.749256 kubelet[2592]: E0702 01:51:52.732128 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.749256 kubelet[2592]: E0702 01:51:52.732315 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.749256 kubelet[2592]: W0702 01:51:52.732324 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.749256 kubelet[2592]: E0702 01:51:52.732333 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.749256 kubelet[2592]: I0702 01:51:52.746153 2592 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/0e07372e-fe9c-4e57-8f34-9753e5469afd-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "0e07372e-fe9c-4e57-8f34-9753e5469afd" (UID: "0e07372e-fe9c-4e57-8f34-9753e5469afd"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Jul 2 01:51:52.754144 kubelet[2592]: E0702 01:51:52.746292 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.754144 kubelet[2592]: W0702 01:51:52.746302 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.754144 kubelet[2592]: E0702 01:51:52.746328 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.754144 kubelet[2592]: I0702 01:51:52.746673 2592 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/0e07372e-fe9c-4e57-8f34-9753e5469afd-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "0e07372e-fe9c-4e57-8f34-9753e5469afd" (UID: "0e07372e-fe9c-4e57-8f34-9753e5469afd"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Jul 2 01:51:52.754144 kubelet[2592]: E0702 01:51:52.746949 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.754144 kubelet[2592]: W0702 01:51:52.746960 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.754144 kubelet[2592]: E0702 01:51:52.746975 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.754144 kubelet[2592]: I0702 01:51:52.751927 2592 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/0e07372e-fe9c-4e57-8f34-9753e5469afd-kube-api-access-k2flc" (OuterVolumeSpecName: "kube-api-access-k2flc") pod "0e07372e-fe9c-4e57-8f34-9753e5469afd" (UID: "0e07372e-fe9c-4e57-8f34-9753e5469afd"). InnerVolumeSpecName "kube-api-access-k2flc". PluginName "kubernetes.io/projected", VolumeGidValue "" Jul 2 01:51:52.750816 systemd[1]: var-lib-kubelet-pods-0e07372e\x2dfe9c\x2d4e57\x2d8f34\x2d9753e5469afd-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dk2flc.mount: Deactivated successfully. Jul 2 01:51:52.754389 kubelet[2592]: E0702 01:51:52.751992 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.754389 kubelet[2592]: W0702 01:51:52.752000 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.754389 kubelet[2592]: E0702 01:51:52.752015 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.754389 kubelet[2592]: E0702 01:51:52.752198 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.754389 kubelet[2592]: W0702 01:51:52.752206 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.754389 kubelet[2592]: E0702 01:51:52.752276 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.754389 kubelet[2592]: E0702 01:51:52.752369 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.754389 kubelet[2592]: W0702 01:51:52.752376 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.754389 kubelet[2592]: E0702 01:51:52.752385 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.754389 kubelet[2592]: E0702 01:51:52.752539 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.754712 kubelet[2592]: W0702 01:51:52.752547 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.754712 kubelet[2592]: E0702 01:51:52.752555 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.698000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:52.769640 kernel: audit: type=1300 audit(1719885112.698:978): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffdc187a20 a2=0 a3=1 items=0 ppid=2729 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:52.769769 kernel: audit: type=1327 audit(1719885112.698:978): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:52.698000 audit[3184]: NETFILTER_CFG table=nat:101 family=2 entries=12 op=nft_register_rule pid=3184 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:52.782611 kernel: audit: type=1325 audit(1719885112.698:979): table=nat:101 family=2 entries=12 op=nft_register_rule pid=3184 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:52.698000 audit[3184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffdc187a20 a2=0 a3=1 items=0 ppid=2729 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:52.698000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:52.820733 kernel: audit: type=1300 audit(1719885112.698:979): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffdc187a20 a2=0 a3=1 items=0 ppid=2729 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:52.834225 kubelet[2592]: E0702 01:51:52.834169 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.834225 kubelet[2592]: W0702 01:51:52.834194 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.834225 kubelet[2592]: E0702 01:51:52.834214 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.834552 kubelet[2592]: E0702 01:51:52.834469 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.834552 kubelet[2592]: W0702 01:51:52.834478 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.834552 kubelet[2592]: E0702 01:51:52.834490 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.834734 kubelet[2592]: E0702 01:51:52.834676 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.834734 kubelet[2592]: W0702 01:51:52.834692 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.834734 kubelet[2592]: E0702 01:51:52.834706 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.834827 kubelet[2592]: I0702 01:51:52.834746 2592 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-k2flc\" (UniqueName: \"kubernetes.io/projected/0e07372e-fe9c-4e57-8f34-9753e5469afd-kube-api-access-k2flc\") on node \"ci-3510.3.5-a-118aa0dcdb\" DevicePath \"\"" Jul 2 01:51:52.834827 kubelet[2592]: I0702 01:51:52.834756 2592 reconciler_common.go:289] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/0e07372e-fe9c-4e57-8f34-9753e5469afd-typha-certs\") on node \"ci-3510.3.5-a-118aa0dcdb\" DevicePath \"\"" Jul 2 01:51:52.834827 kubelet[2592]: I0702 01:51:52.834767 2592 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0e07372e-fe9c-4e57-8f34-9753e5469afd-tigera-ca-bundle\") on node \"ci-3510.3.5-a-118aa0dcdb\" DevicePath \"\"" Jul 2 01:51:52.834979 kubelet[2592]: E0702 01:51:52.834927 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.834979 kubelet[2592]: W0702 01:51:52.834939 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.834979 kubelet[2592]: E0702 01:51:52.834953 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.835133 kubelet[2592]: E0702 01:51:52.835107 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.835133 kubelet[2592]: W0702 01:51:52.835115 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.835133 kubelet[2592]: E0702 01:51:52.835125 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.835308 kubelet[2592]: E0702 01:51:52.835254 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.835308 kubelet[2592]: W0702 01:51:52.835266 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.835308 kubelet[2592]: E0702 01:51:52.835274 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.835502 kubelet[2592]: E0702 01:51:52.835433 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.835502 kubelet[2592]: W0702 01:51:52.835444 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.835502 kubelet[2592]: E0702 01:51:52.835472 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.783000 audit[3216]: NETFILTER_CFG table=filter:102 family=2 entries=16 op=nft_register_rule pid=3216 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:52.849797 kernel: audit: type=1327 audit(1719885112.698:979): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:52.849874 kernel: audit: type=1325 audit(1719885112.783:980): table=filter:102 family=2 entries=16 op=nft_register_rule pid=3216 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:52.849905 kubelet[2592]: E0702 01:51:52.837469 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.849905 kubelet[2592]: W0702 01:51:52.837481 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.849905 kubelet[2592]: E0702 01:51:52.837496 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.849905 kubelet[2592]: E0702 01:51:52.842618 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.849905 kubelet[2592]: W0702 01:51:52.842629 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.849905 kubelet[2592]: E0702 01:51:52.842706 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.849905 kubelet[2592]: E0702 01:51:52.849842 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.849905 kubelet[2592]: W0702 01:51:52.849855 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.849905 kubelet[2592]: E0702 01:51:52.849871 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.850164 kubelet[2592]: E0702 01:51:52.850063 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.850164 kubelet[2592]: W0702 01:51:52.850072 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.850164 kubelet[2592]: E0702 01:51:52.850147 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.783000 audit[3216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff2694870 a2=0 a3=1 items=0 ppid=2729 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:52.850319 kubelet[2592]: E0702 01:51:52.850247 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.850319 kubelet[2592]: W0702 01:51:52.850255 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.850319 kubelet[2592]: E0702 01:51:52.850265 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.876877 kernel: audit: type=1300 audit(1719885112.783:980): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff2694870 a2=0 a3=1 items=0 ppid=2729 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:52.876976 kubelet[2592]: E0702 01:51:52.850442 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.876976 kubelet[2592]: W0702 01:51:52.850528 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.876976 kubelet[2592]: E0702 01:51:52.850541 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.876976 kubelet[2592]: E0702 01:51:52.865631 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.876976 kubelet[2592]: W0702 01:51:52.865649 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.877194 kubelet[2592]: E0702 01:51:52.877133 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.783000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:52.784000 audit[3216]: NETFILTER_CFG table=nat:103 family=2 entries=12 op=nft_register_rule pid=3216 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:51:52.784000 audit[3216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff2694870 a2=0 a3=1 items=0 ppid=2729 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:52.784000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:51:52.880804 systemd[1]: Removed slice kubepods-besteffort-pod0e07372e_fe9c_4e57_8f34_9753e5469afd.slice. Jul 2 01:51:52.882693 kubelet[2592]: E0702 01:51:52.882662 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.882819 kubelet[2592]: W0702 01:51:52.882802 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.882894 kubelet[2592]: E0702 01:51:52.882882 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.885336 kubelet[2592]: E0702 01:51:52.884566 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.885336 kubelet[2592]: W0702 01:51:52.884585 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.885336 kubelet[2592]: E0702 01:51:52.884600 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.890721 kubelet[2592]: E0702 01:51:52.890696 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.890721 kubelet[2592]: W0702 01:51:52.890715 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.890721 kubelet[2592]: E0702 01:51:52.890729 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.890911 kubelet[2592]: E0702 01:51:52.890890 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 01:51:52.890911 kubelet[2592]: W0702 01:51:52.890904 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 01:51:52.890988 kubelet[2592]: E0702 01:51:52.890913 2592 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 01:51:52.897078 env[1471]: time="2024-07-02T01:51:52.896345466Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:52.904649 env[1471]: time="2024-07-02T01:51:52.904034041Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b6a6a9b369fa6127e23e376ac423670fa81290e0860917acaacae108e3cc064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:52.909855 env[1471]: time="2024-07-02T01:51:52.909823203Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:52.914871 env[1471]: time="2024-07-02T01:51:52.914841633Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:52.915538 env[1471]: time="2024-07-02T01:51:52.915511679Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:4b6a6a9b369fa6127e23e376ac423670fa81290e0860917acaacae108e3cc064\"" Jul 2 01:51:52.918164 env[1471]: time="2024-07-02T01:51:52.918129021Z" level=info msg="CreateContainer within sandbox \"2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 01:51:52.936294 kubelet[2592]: I0702 01:51:52.936255 2592 scope.go:117] "RemoveContainer" containerID="c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc" Jul 2 01:51:52.939997 env[1471]: time="2024-07-02T01:51:52.939961941Z" level=info msg="RemoveContainer for \"c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc\"" Jul 2 01:51:52.956637 env[1471]: time="2024-07-02T01:51:52.956585858Z" level=info msg="RemoveContainer for \"c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc\" returns successfully" Jul 2 01:51:52.956891 kubelet[2592]: I0702 01:51:52.956862 2592 scope.go:117] "RemoveContainer" containerID="c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc" Jul 2 01:51:52.957978 env[1471]: time="2024-07-02T01:51:52.957900749Z" level=error msg="ContainerStatus for \"c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc\": not found" Jul 2 01:51:52.958119 kubelet[2592]: E0702 01:51:52.958088 2592 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc\": not found" containerID="c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc" Jul 2 01:51:52.958194 kubelet[2592]: I0702 01:51:52.958120 2592 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc"} err="failed to get container status \"c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc\": rpc error: code = NotFound desc = an error occurred when try to find container \"c32fd2a044d8fdd9d06a959f01ec18e523f893f078fc907593a9cd8e101345dc\": not found" Jul 2 01:51:52.972383 env[1471]: time="2024-07-02T01:51:52.972336954Z" level=info msg="CreateContainer within sandbox \"2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a4eb097d7aaa04c5e5bf084b09e778b7b8aa12eb4bf9085c774b6352e3fffaa8\"" Jul 2 01:51:52.973322 env[1471]: time="2024-07-02T01:51:52.973299661Z" level=info msg="StartContainer for \"a4eb097d7aaa04c5e5bf084b09e778b7b8aa12eb4bf9085c774b6352e3fffaa8\"" Jul 2 01:51:52.981535 env[1471]: time="2024-07-02T01:51:52.981504032Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-59544599cb-ct7p4,Uid:d2553f97-65bf-4efb-8aae-ae996a530b85,Namespace:calico-system,Attempt:0,}" Jul 2 01:51:53.007610 systemd[1]: Started cri-containerd-a4eb097d7aaa04c5e5bf084b09e778b7b8aa12eb4bf9085c774b6352e3fffaa8.scope. Jul 2 01:51:53.022051 env[1471]: time="2024-07-02T01:51:53.021944983Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:51:53.022051 env[1471]: time="2024-07-02T01:51:53.022022029Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:51:53.022293 env[1471]: time="2024-07-02T01:51:53.022032549Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:51:53.022492 env[1471]: time="2024-07-02T01:51:53.022435537Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/10d6004073812f72c2d99cbb6bb0711789a93f214e97d29e9650fc50c31ef70d pid=3266 runtime=io.containerd.runc.v2 Jul 2 01:51:53.039779 systemd[1]: Started cri-containerd-10d6004073812f72c2d99cbb6bb0711789a93f214e97d29e9650fc50c31ef70d.scope. Jul 2 01:51:53.042000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.042000 audit[3244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3041 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:53.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134656230393764376161613034633565356266303834623039653737 Jul 2 01:51:53.042000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.042000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.042000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.042000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.042000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.042000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.042000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.042000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.042000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.042000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.042000 audit: BPF prog-id=128 op=LOAD Jul 2 01:51:53.042000 audit[3244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3041 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:53.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134656230393764376161613034633565356266303834623039653737 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit: BPF prog-id=129 op=LOAD Jul 2 01:51:53.044000 audit[3244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3041 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:53.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134656230393764376161613034633565356266303834623039653737 Jul 2 01:51:53.044000 audit: BPF prog-id=129 op=UNLOAD Jul 2 01:51:53.044000 audit: BPF prog-id=128 op=UNLOAD Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.044000 audit: BPF prog-id=130 op=LOAD Jul 2 01:51:53.044000 audit[3244]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3041 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:53.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134656230393764376161613034633565356266303834623039653737 Jul 2 01:51:53.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.072000 audit: BPF prog-id=131 op=LOAD Jul 2 01:51:53.073000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.073000 audit[3278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3266 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:53.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130643630303430373338313266373263326439396362623662623037 Jul 2 01:51:53.073000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.073000 audit[3278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3266 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:53.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130643630303430373338313266373263326439396362623662623037 Jul 2 01:51:53.073000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.073000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.073000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.073000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.073000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.073000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.073000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.073000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.073000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.073000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.073000 audit: BPF prog-id=132 op=LOAD Jul 2 01:51:53.073000 audit[3278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3266 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:53.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130643630303430373338313266373263326439396362623662623037 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit: BPF prog-id=133 op=LOAD Jul 2 01:51:53.074000 audit[3278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3266 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:53.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130643630303430373338313266373263326439396362623662623037 Jul 2 01:51:53.074000 audit: BPF prog-id=133 op=UNLOAD Jul 2 01:51:53.074000 audit: BPF prog-id=132 op=UNLOAD Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.074000 audit: BPF prog-id=134 op=LOAD Jul 2 01:51:53.074000 audit[3278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3266 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:53.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130643630303430373338313266373263326439396362623662623037 Jul 2 01:51:53.088358 env[1471]: time="2024-07-02T01:51:53.088282167Z" level=info msg="StartContainer for \"a4eb097d7aaa04c5e5bf084b09e778b7b8aa12eb4bf9085c774b6352e3fffaa8\" returns successfully" Jul 2 01:51:53.108963 env[1471]: time="2024-07-02T01:51:53.108910060Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-59544599cb-ct7p4,Uid:d2553f97-65bf-4efb-8aae-ae996a530b85,Namespace:calico-system,Attempt:0,} returns sandbox id \"10d6004073812f72c2d99cbb6bb0711789a93f214e97d29e9650fc50c31ef70d\"" Jul 2 01:51:53.110335 systemd[1]: cri-containerd-a4eb097d7aaa04c5e5bf084b09e778b7b8aa12eb4bf9085c774b6352e3fffaa8.scope: Deactivated successfully. Jul 2 01:51:53.115000 audit: BPF prog-id=130 op=UNLOAD Jul 2 01:51:53.122210 env[1471]: time="2024-07-02T01:51:53.122177209Z" level=info msg="CreateContainer within sandbox \"10d6004073812f72c2d99cbb6bb0711789a93f214e97d29e9650fc50c31ef70d\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 2 01:51:53.337763 env[1471]: time="2024-07-02T01:51:53.337705291Z" level=info msg="CreateContainer within sandbox \"10d6004073812f72c2d99cbb6bb0711789a93f214e97d29e9650fc50c31ef70d\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"2fed255ec8d9718d8afde34d15320f7fad461df866691ea826b7da9a310bc197\"" Jul 2 01:51:53.338796 env[1471]: time="2024-07-02T01:51:53.338593552Z" level=info msg="StartContainer for \"2fed255ec8d9718d8afde34d15320f7fad461df866691ea826b7da9a310bc197\"" Jul 2 01:51:53.347002 env[1471]: time="2024-07-02T01:51:53.346918802Z" level=info msg="shim disconnected" id=a4eb097d7aaa04c5e5bf084b09e778b7b8aa12eb4bf9085c774b6352e3fffaa8 Jul 2 01:51:53.347002 env[1471]: time="2024-07-02T01:51:53.346999247Z" level=warning msg="cleaning up after shim disconnected" id=a4eb097d7aaa04c5e5bf084b09e778b7b8aa12eb4bf9085c774b6352e3fffaa8 namespace=k8s.io Jul 2 01:51:53.347002 env[1471]: time="2024-07-02T01:51:53.347008288Z" level=info msg="cleaning up dead shim" Jul 2 01:51:53.366595 systemd[1]: Started cri-containerd-2fed255ec8d9718d8afde34d15320f7fad461df866691ea826b7da9a310bc197.scope. Jul 2 01:51:53.374935 env[1471]: time="2024-07-02T01:51:53.374889838Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:51:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3334 runtime=io.containerd.runc.v2\n" Jul 2 01:51:53.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.442000 audit: BPF prog-id=135 op=LOAD Jul 2 01:51:53.443000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.443000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3266 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:53.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266656432353565633864393731386438616664653334643135333230 Jul 2 01:51:53.443000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.443000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3266 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:53.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266656432353565633864393731386438616664653334643135333230 Jul 2 01:51:53.443000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.443000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.443000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.443000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.443000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.443000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.443000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.443000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.443000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.443000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.443000 audit: BPF prog-id=136 op=LOAD Jul 2 01:51:53.443000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3266 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:53.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266656432353565633864393731386438616664653334643135333230 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit: BPF prog-id=137 op=LOAD Jul 2 01:51:53.444000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3266 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:53.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266656432353565633864393731386438616664653334643135333230 Jul 2 01:51:53.444000 audit: BPF prog-id=137 op=UNLOAD Jul 2 01:51:53.444000 audit: BPF prog-id=136 op=UNLOAD Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:53.444000 audit: BPF prog-id=138 op=LOAD Jul 2 01:51:53.444000 audit[3333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3266 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:53.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266656432353565633864393731386438616664653334643135333230 Jul 2 01:51:53.474482 env[1471]: time="2024-07-02T01:51:53.474413894Z" level=info msg="StartContainer for \"2fed255ec8d9718d8afde34d15320f7fad461df866691ea826b7da9a310bc197\" returns successfully" Jul 2 01:51:53.844390 kubelet[2592]: E0702 01:51:53.844292 2592 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m94hx" podUID="4b19f760-4591-4466-a6d7-b7bc3509cff0" Jul 2 01:51:53.944372 env[1471]: time="2024-07-02T01:51:53.944315759Z" level=info msg="StopPodSandbox for \"2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2\"" Jul 2 01:51:53.944757 env[1471]: time="2024-07-02T01:51:53.944428847Z" level=info msg="Container to stop \"a4eb097d7aaa04c5e5bf084b09e778b7b8aa12eb4bf9085c774b6352e3fffaa8\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Jul 2 01:51:53.947088 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2-shm.mount: Deactivated successfully. Jul 2 01:51:53.952000 audit: BPF prog-id=120 op=UNLOAD Jul 2 01:51:53.953586 systemd[1]: cri-containerd-2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2.scope: Deactivated successfully. Jul 2 01:51:53.957000 audit: BPF prog-id=123 op=UNLOAD Jul 2 01:51:53.984232 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2-rootfs.mount: Deactivated successfully. Jul 2 01:51:53.993632 kubelet[2592]: I0702 01:51:53.993572 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-59544599cb-ct7p4" podStartSLOduration=5.993553412 podStartE2EDuration="5.993553412s" podCreationTimestamp="2024-07-02 01:51:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 01:51:53.964950613 +0000 UTC m=+29.241519312" watchObservedRunningTime="2024-07-02 01:51:53.993553412 +0000 UTC m=+29.270122111" Jul 2 01:51:54.028830 env[1471]: time="2024-07-02T01:51:54.028774955Z" level=info msg="shim disconnected" id=2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2 Jul 2 01:51:54.029780 env[1471]: time="2024-07-02T01:51:54.029754901Z" level=warning msg="cleaning up after shim disconnected" id=2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2 namespace=k8s.io Jul 2 01:51:54.029896 env[1471]: time="2024-07-02T01:51:54.029880150Z" level=info msg="cleaning up dead shim" Jul 2 01:51:54.039697 env[1471]: time="2024-07-02T01:51:54.039659809Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:51:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3398 runtime=io.containerd.runc.v2\n" Jul 2 01:51:54.040133 env[1471]: time="2024-07-02T01:51:54.040103079Z" level=info msg="TearDown network for sandbox \"2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2\" successfully" Jul 2 01:51:54.040257 env[1471]: time="2024-07-02T01:51:54.040238888Z" level=info msg="StopPodSandbox for \"2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2\" returns successfully" Jul 2 01:51:54.142097 kubelet[2592]: I0702 01:51:54.141998 2592 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/64d9ecd4-71e0-457a-9e92-9c192a339a7e-tigera-ca-bundle\") pod \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " Jul 2 01:51:54.142317 kubelet[2592]: I0702 01:51:54.142300 2592 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-cni-log-dir\") pod \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " Jul 2 01:51:54.142398 kubelet[2592]: I0702 01:51:54.142386 2592 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-var-lib-calico\") pod \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " Jul 2 01:51:54.142492 kubelet[2592]: I0702 01:51:54.142478 2592 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-cni-net-dir\") pod \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " Jul 2 01:51:54.142588 kubelet[2592]: I0702 01:51:54.142574 2592 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-xtables-lock\") pod \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " Jul 2 01:51:54.142667 kubelet[2592]: I0702 01:51:54.142653 2592 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-cni-bin-dir\") pod \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " Jul 2 01:51:54.142752 kubelet[2592]: I0702 01:51:54.142734 2592 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-flexvol-driver-host\") pod \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " Jul 2 01:51:54.142838 kubelet[2592]: I0702 01:51:54.142825 2592 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-54vlq\" (UniqueName: \"kubernetes.io/projected/64d9ecd4-71e0-457a-9e92-9c192a339a7e-kube-api-access-54vlq\") pod \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " Jul 2 01:51:54.142914 kubelet[2592]: I0702 01:51:54.142903 2592 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-lib-modules\") pod \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " Jul 2 01:51:54.142985 kubelet[2592]: I0702 01:51:54.142974 2592 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-var-run-calico\") pod \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " Jul 2 01:51:54.143068 kubelet[2592]: I0702 01:51:54.143056 2592 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/64d9ecd4-71e0-457a-9e92-9c192a339a7e-node-certs\") pod \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " Jul 2 01:51:54.143141 kubelet[2592]: I0702 01:51:54.143129 2592 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-policysync\") pod \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\" (UID: \"64d9ecd4-71e0-457a-9e92-9c192a339a7e\") " Jul 2 01:51:54.143277 kubelet[2592]: I0702 01:51:54.143260 2592 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-policysync" (OuterVolumeSpecName: "policysync") pod "64d9ecd4-71e0-457a-9e92-9c192a339a7e" (UID: "64d9ecd4-71e0-457a-9e92-9c192a339a7e"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 01:51:54.143739 kubelet[2592]: I0702 01:51:54.143715 2592 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/64d9ecd4-71e0-457a-9e92-9c192a339a7e-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "64d9ecd4-71e0-457a-9e92-9c192a339a7e" (UID: "64d9ecd4-71e0-457a-9e92-9c192a339a7e"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Jul 2 01:51:54.144577 kubelet[2592]: I0702 01:51:54.143848 2592 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "64d9ecd4-71e0-457a-9e92-9c192a339a7e" (UID: "64d9ecd4-71e0-457a-9e92-9c192a339a7e"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 01:51:54.144747 kubelet[2592]: I0702 01:51:54.143867 2592 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "64d9ecd4-71e0-457a-9e92-9c192a339a7e" (UID: "64d9ecd4-71e0-457a-9e92-9c192a339a7e"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 01:51:54.144849 kubelet[2592]: I0702 01:51:54.143879 2592 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "64d9ecd4-71e0-457a-9e92-9c192a339a7e" (UID: "64d9ecd4-71e0-457a-9e92-9c192a339a7e"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 01:51:54.144929 kubelet[2592]: I0702 01:51:54.143888 2592 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "64d9ecd4-71e0-457a-9e92-9c192a339a7e" (UID: "64d9ecd4-71e0-457a-9e92-9c192a339a7e"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 01:51:54.145001 kubelet[2592]: I0702 01:51:54.143898 2592 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "64d9ecd4-71e0-457a-9e92-9c192a339a7e" (UID: "64d9ecd4-71e0-457a-9e92-9c192a339a7e"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 01:51:54.145077 kubelet[2592]: I0702 01:51:54.143908 2592 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "64d9ecd4-71e0-457a-9e92-9c192a339a7e" (UID: "64d9ecd4-71e0-457a-9e92-9c192a339a7e"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 01:51:54.145146 kubelet[2592]: I0702 01:51:54.143932 2592 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "64d9ecd4-71e0-457a-9e92-9c192a339a7e" (UID: "64d9ecd4-71e0-457a-9e92-9c192a339a7e"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 01:51:54.145216 kubelet[2592]: I0702 01:51:54.143956 2592 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "64d9ecd4-71e0-457a-9e92-9c192a339a7e" (UID: "64d9ecd4-71e0-457a-9e92-9c192a339a7e"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Jul 2 01:51:54.148856 systemd[1]: var-lib-kubelet-pods-64d9ecd4\x2d71e0\x2d457a\x2d9e92\x2d9c192a339a7e-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Jul 2 01:51:54.150301 kubelet[2592]: I0702 01:51:54.149680 2592 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/64d9ecd4-71e0-457a-9e92-9c192a339a7e-node-certs" (OuterVolumeSpecName: "node-certs") pod "64d9ecd4-71e0-457a-9e92-9c192a339a7e" (UID: "64d9ecd4-71e0-457a-9e92-9c192a339a7e"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Jul 2 01:51:54.152487 systemd[1]: var-lib-kubelet-pods-64d9ecd4\x2d71e0\x2d457a\x2d9e92\x2d9c192a339a7e-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d54vlq.mount: Deactivated successfully. Jul 2 01:51:54.155646 kubelet[2592]: I0702 01:51:54.154412 2592 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/64d9ecd4-71e0-457a-9e92-9c192a339a7e-kube-api-access-54vlq" (OuterVolumeSpecName: "kube-api-access-54vlq") pod "64d9ecd4-71e0-457a-9e92-9c192a339a7e" (UID: "64d9ecd4-71e0-457a-9e92-9c192a339a7e"). InnerVolumeSpecName "kube-api-access-54vlq". PluginName "kubernetes.io/projected", VolumeGidValue "" Jul 2 01:51:54.244387 kubelet[2592]: I0702 01:51:54.244349 2592 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/64d9ecd4-71e0-457a-9e92-9c192a339a7e-tigera-ca-bundle\") on node \"ci-3510.3.5-a-118aa0dcdb\" DevicePath \"\"" Jul 2 01:51:54.244680 kubelet[2592]: I0702 01:51:54.244665 2592 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-cni-log-dir\") on node \"ci-3510.3.5-a-118aa0dcdb\" DevicePath \"\"" Jul 2 01:51:54.244813 kubelet[2592]: I0702 01:51:54.244801 2592 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-var-lib-calico\") on node \"ci-3510.3.5-a-118aa0dcdb\" DevicePath \"\"" Jul 2 01:51:54.244925 kubelet[2592]: I0702 01:51:54.244912 2592 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-cni-net-dir\") on node \"ci-3510.3.5-a-118aa0dcdb\" DevicePath \"\"" Jul 2 01:51:54.245027 kubelet[2592]: I0702 01:51:54.245016 2592 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-cni-bin-dir\") on node \"ci-3510.3.5-a-118aa0dcdb\" DevicePath \"\"" Jul 2 01:51:54.245100 kubelet[2592]: I0702 01:51:54.245090 2592 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-xtables-lock\") on node \"ci-3510.3.5-a-118aa0dcdb\" DevicePath \"\"" Jul 2 01:51:54.245205 kubelet[2592]: I0702 01:51:54.245192 2592 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-54vlq\" (UniqueName: \"kubernetes.io/projected/64d9ecd4-71e0-457a-9e92-9c192a339a7e-kube-api-access-54vlq\") on node \"ci-3510.3.5-a-118aa0dcdb\" DevicePath \"\"" Jul 2 01:51:54.245278 kubelet[2592]: I0702 01:51:54.245265 2592 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-flexvol-driver-host\") on node \"ci-3510.3.5-a-118aa0dcdb\" DevicePath \"\"" Jul 2 01:51:54.245384 kubelet[2592]: I0702 01:51:54.245371 2592 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-policysync\") on node \"ci-3510.3.5-a-118aa0dcdb\" DevicePath \"\"" Jul 2 01:51:54.245504 kubelet[2592]: I0702 01:51:54.245443 2592 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-lib-modules\") on node \"ci-3510.3.5-a-118aa0dcdb\" DevicePath \"\"" Jul 2 01:51:54.245574 kubelet[2592]: I0702 01:51:54.245564 2592 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/64d9ecd4-71e0-457a-9e92-9c192a339a7e-var-run-calico\") on node \"ci-3510.3.5-a-118aa0dcdb\" DevicePath \"\"" Jul 2 01:51:54.245686 kubelet[2592]: I0702 01:51:54.245674 2592 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/64d9ecd4-71e0-457a-9e92-9c192a339a7e-node-certs\") on node \"ci-3510.3.5-a-118aa0dcdb\" DevicePath \"\"" Jul 2 01:51:54.846844 kubelet[2592]: I0702 01:51:54.846807 2592 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="0e07372e-fe9c-4e57-8f34-9753e5469afd" path="/var/lib/kubelet/pods/0e07372e-fe9c-4e57-8f34-9753e5469afd/volumes" Jul 2 01:51:54.851253 systemd[1]: Removed slice kubepods-besteffort-pod64d9ecd4_71e0_457a_9e92_9c192a339a7e.slice. Jul 2 01:51:54.948120 kubelet[2592]: I0702 01:51:54.948055 2592 scope.go:117] "RemoveContainer" containerID="a4eb097d7aaa04c5e5bf084b09e778b7b8aa12eb4bf9085c774b6352e3fffaa8" Jul 2 01:51:54.951489 env[1471]: time="2024-07-02T01:51:54.951112469Z" level=info msg="RemoveContainer for \"a4eb097d7aaa04c5e5bf084b09e778b7b8aa12eb4bf9085c774b6352e3fffaa8\"" Jul 2 01:51:54.962122 env[1471]: time="2024-07-02T01:51:54.962071408Z" level=info msg="RemoveContainer for \"a4eb097d7aaa04c5e5bf084b09e778b7b8aa12eb4bf9085c774b6352e3fffaa8\" returns successfully" Jul 2 01:51:54.986314 kubelet[2592]: I0702 01:51:54.986271 2592 topology_manager.go:215] "Topology Admit Handler" podUID="d9de3f4c-312e-4b5c-b27f-3e7ac02a080a" podNamespace="calico-system" podName="calico-node-ssgjb" Jul 2 01:51:54.986567 kubelet[2592]: E0702 01:51:54.986551 2592 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="64d9ecd4-71e0-457a-9e92-9c192a339a7e" containerName="flexvol-driver" Jul 2 01:51:54.986694 kubelet[2592]: I0702 01:51:54.986680 2592 memory_manager.go:354] "RemoveStaleState removing state" podUID="64d9ecd4-71e0-457a-9e92-9c192a339a7e" containerName="flexvol-driver" Jul 2 01:51:54.991961 systemd[1]: Created slice kubepods-besteffort-podd9de3f4c_312e_4b5c_b27f_3e7ac02a080a.slice. Jul 2 01:51:55.051953 kubelet[2592]: I0702 01:51:55.051907 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d9de3f4c-312e-4b5c-b27f-3e7ac02a080a-cni-bin-dir\") pod \"calico-node-ssgjb\" (UID: \"d9de3f4c-312e-4b5c-b27f-3e7ac02a080a\") " pod="calico-system/calico-node-ssgjb" Jul 2 01:51:55.052178 kubelet[2592]: I0702 01:51:55.052158 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d9de3f4c-312e-4b5c-b27f-3e7ac02a080a-cni-net-dir\") pod \"calico-node-ssgjb\" (UID: \"d9de3f4c-312e-4b5c-b27f-3e7ac02a080a\") " pod="calico-system/calico-node-ssgjb" Jul 2 01:51:55.052294 kubelet[2592]: I0702 01:51:55.052278 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d9de3f4c-312e-4b5c-b27f-3e7ac02a080a-var-run-calico\") pod \"calico-node-ssgjb\" (UID: \"d9de3f4c-312e-4b5c-b27f-3e7ac02a080a\") " pod="calico-system/calico-node-ssgjb" Jul 2 01:51:55.052406 kubelet[2592]: I0702 01:51:55.052393 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d9de3f4c-312e-4b5c-b27f-3e7ac02a080a-lib-modules\") pod \"calico-node-ssgjb\" (UID: \"d9de3f4c-312e-4b5c-b27f-3e7ac02a080a\") " pod="calico-system/calico-node-ssgjb" Jul 2 01:51:55.052527 kubelet[2592]: I0702 01:51:55.052510 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d9de3f4c-312e-4b5c-b27f-3e7ac02a080a-policysync\") pod \"calico-node-ssgjb\" (UID: \"d9de3f4c-312e-4b5c-b27f-3e7ac02a080a\") " pod="calico-system/calico-node-ssgjb" Jul 2 01:51:55.052653 kubelet[2592]: I0702 01:51:55.052637 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d9de3f4c-312e-4b5c-b27f-3e7ac02a080a-xtables-lock\") pod \"calico-node-ssgjb\" (UID: \"d9de3f4c-312e-4b5c-b27f-3e7ac02a080a\") " pod="calico-system/calico-node-ssgjb" Jul 2 01:51:55.052738 kubelet[2592]: I0702 01:51:55.052725 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dkkbz\" (UniqueName: \"kubernetes.io/projected/d9de3f4c-312e-4b5c-b27f-3e7ac02a080a-kube-api-access-dkkbz\") pod \"calico-node-ssgjb\" (UID: \"d9de3f4c-312e-4b5c-b27f-3e7ac02a080a\") " pod="calico-system/calico-node-ssgjb" Jul 2 01:51:55.052822 kubelet[2592]: I0702 01:51:55.052809 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d9de3f4c-312e-4b5c-b27f-3e7ac02a080a-node-certs\") pod \"calico-node-ssgjb\" (UID: \"d9de3f4c-312e-4b5c-b27f-3e7ac02a080a\") " pod="calico-system/calico-node-ssgjb" Jul 2 01:51:55.052910 kubelet[2592]: I0702 01:51:55.052895 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d9de3f4c-312e-4b5c-b27f-3e7ac02a080a-var-lib-calico\") pod \"calico-node-ssgjb\" (UID: \"d9de3f4c-312e-4b5c-b27f-3e7ac02a080a\") " pod="calico-system/calico-node-ssgjb" Jul 2 01:51:55.053012 kubelet[2592]: I0702 01:51:55.053000 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d9de3f4c-312e-4b5c-b27f-3e7ac02a080a-flexvol-driver-host\") pod \"calico-node-ssgjb\" (UID: \"d9de3f4c-312e-4b5c-b27f-3e7ac02a080a\") " pod="calico-system/calico-node-ssgjb" Jul 2 01:51:55.053110 kubelet[2592]: I0702 01:51:55.053091 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d9de3f4c-312e-4b5c-b27f-3e7ac02a080a-cni-log-dir\") pod \"calico-node-ssgjb\" (UID: \"d9de3f4c-312e-4b5c-b27f-3e7ac02a080a\") " pod="calico-system/calico-node-ssgjb" Jul 2 01:51:55.053203 kubelet[2592]: I0702 01:51:55.053187 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d9de3f4c-312e-4b5c-b27f-3e7ac02a080a-tigera-ca-bundle\") pod \"calico-node-ssgjb\" (UID: \"d9de3f4c-312e-4b5c-b27f-3e7ac02a080a\") " pod="calico-system/calico-node-ssgjb" Jul 2 01:51:55.296161 env[1471]: time="2024-07-02T01:51:55.295962780Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ssgjb,Uid:d9de3f4c-312e-4b5c-b27f-3e7ac02a080a,Namespace:calico-system,Attempt:0,}" Jul 2 01:51:55.342639 env[1471]: time="2024-07-02T01:51:55.341428119Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:51:55.342639 env[1471]: time="2024-07-02T01:51:55.341524846Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:51:55.342639 env[1471]: time="2024-07-02T01:51:55.341535406Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:51:55.342639 env[1471]: time="2024-07-02T01:51:55.341649494Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d798c18fc4fb48c6ecfe4270d428b632c17582fc3ced3e2e97e5b7d9298a6449 pid=3423 runtime=io.containerd.runc.v2 Jul 2 01:51:55.363557 systemd[1]: Started cri-containerd-d798c18fc4fb48c6ecfe4270d428b632c17582fc3ced3e2e97e5b7d9298a6449.scope. Jul 2 01:51:55.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.384000 audit: BPF prog-id=139 op=LOAD Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3423 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:55.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437393863313866633466623438633665636665343237306434323862 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3423 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:55.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437393863313866633466623438633665636665343237306434323862 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit: BPF prog-id=140 op=LOAD Jul 2 01:51:55.385000 audit[3433]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3423 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:55.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437393863313866633466623438633665636665343237306434323862 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.385000 audit: BPF prog-id=141 op=LOAD Jul 2 01:51:55.385000 audit[3433]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3423 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:55.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437393863313866633466623438633665636665343237306434323862 Jul 2 01:51:55.387000 audit: BPF prog-id=141 op=UNLOAD Jul 2 01:51:55.387000 audit: BPF prog-id=140 op=UNLOAD Jul 2 01:51:55.387000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.387000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.387000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.387000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.387000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.387000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.387000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.387000 audit[3433]: AVC avc: denied { perfmon } for pid=3433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.387000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.387000 audit[3433]: AVC avc: denied { bpf } for pid=3433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.387000 audit: BPF prog-id=142 op=LOAD Jul 2 01:51:55.387000 audit[3433]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3423 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:55.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437393863313866633466623438633665636665343237306434323862 Jul 2 01:51:55.406024 env[1471]: time="2024-07-02T01:51:55.405948564Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ssgjb,Uid:d9de3f4c-312e-4b5c-b27f-3e7ac02a080a,Namespace:calico-system,Attempt:0,} returns sandbox id \"d798c18fc4fb48c6ecfe4270d428b632c17582fc3ced3e2e97e5b7d9298a6449\"" Jul 2 01:51:55.412282 env[1471]: time="2024-07-02T01:51:55.411415087Z" level=info msg="CreateContainer within sandbox \"d798c18fc4fb48c6ecfe4270d428b632c17582fc3ced3e2e97e5b7d9298a6449\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 01:51:55.449015 env[1471]: time="2024-07-02T01:51:55.448921737Z" level=info msg="CreateContainer within sandbox \"d798c18fc4fb48c6ecfe4270d428b632c17582fc3ced3e2e97e5b7d9298a6449\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"34effdf1fb65aa8dabf4a075aab4bcf222160e79d01c579a6e97aee5285a2bbe\"" Jul 2 01:51:55.451342 env[1471]: time="2024-07-02T01:51:55.451272293Z" level=info msg="StartContainer for \"34effdf1fb65aa8dabf4a075aab4bcf222160e79d01c579a6e97aee5285a2bbe\"" Jul 2 01:51:55.471267 systemd[1]: Started cri-containerd-34effdf1fb65aa8dabf4a075aab4bcf222160e79d01c579a6e97aee5285a2bbe.scope. Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3423 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:55.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334656666646631666236356161386461626634613037356161623462 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit: BPF prog-id=143 op=LOAD Jul 2 01:51:55.487000 audit[3465]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3423 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:55.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334656666646631666236356161386461626634613037356161623462 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit: BPF prog-id=144 op=LOAD Jul 2 01:51:55.487000 audit[3465]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3423 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:55.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334656666646631666236356161386461626634613037356161623462 Jul 2 01:51:55.487000 audit: BPF prog-id=144 op=UNLOAD Jul 2 01:51:55.487000 audit: BPF prog-id=143 op=UNLOAD Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:55.487000 audit: BPF prog-id=145 op=LOAD Jul 2 01:51:55.487000 audit[3465]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3423 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:55.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334656666646631666236356161386461626634613037356161623462 Jul 2 01:51:55.507540 env[1471]: time="2024-07-02T01:51:55.507438703Z" level=info msg="StartContainer for \"34effdf1fb65aa8dabf4a075aab4bcf222160e79d01c579a6e97aee5285a2bbe\" returns successfully" Jul 2 01:51:55.523041 systemd[1]: cri-containerd-34effdf1fb65aa8dabf4a075aab4bcf222160e79d01c579a6e97aee5285a2bbe.scope: Deactivated successfully. Jul 2 01:51:55.525000 audit: BPF prog-id=145 op=UNLOAD Jul 2 01:51:55.628653 env[1471]: time="2024-07-02T01:51:55.628595548Z" level=info msg="shim disconnected" id=34effdf1fb65aa8dabf4a075aab4bcf222160e79d01c579a6e97aee5285a2bbe Jul 2 01:51:55.628882 env[1471]: time="2024-07-02T01:51:55.628708355Z" level=warning msg="cleaning up after shim disconnected" id=34effdf1fb65aa8dabf4a075aab4bcf222160e79d01c579a6e97aee5285a2bbe namespace=k8s.io Jul 2 01:51:55.628882 env[1471]: time="2024-07-02T01:51:55.628720916Z" level=info msg="cleaning up dead shim" Jul 2 01:51:55.637542 env[1471]: time="2024-07-02T01:51:55.637435855Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:51:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3503 runtime=io.containerd.runc.v2\n" Jul 2 01:51:55.843711 kubelet[2592]: E0702 01:51:55.843667 2592 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m94hx" podUID="4b19f760-4591-4466-a6d7-b7bc3509cff0" Jul 2 01:51:55.952493 env[1471]: time="2024-07-02T01:51:55.952369567Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 01:51:56.846915 kubelet[2592]: I0702 01:51:56.846867 2592 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="64d9ecd4-71e0-457a-9e92-9c192a339a7e" path="/var/lib/kubelet/pods/64d9ecd4-71e0-457a-9e92-9c192a339a7e/volumes" Jul 2 01:51:57.844383 kubelet[2592]: E0702 01:51:57.844334 2592 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m94hx" podUID="4b19f760-4591-4466-a6d7-b7bc3509cff0" Jul 2 01:51:59.601839 env[1471]: time="2024-07-02T01:51:59.601789759Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:59.609562 env[1471]: time="2024-07-02T01:51:59.609524883Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:adcb19ea66141abcd7dc426e3205f2e6ff26e524a3f7148c97f3d49933f502ee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:59.612700 env[1471]: time="2024-07-02T01:51:59.612654999Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:59.616011 env[1471]: time="2024-07-02T01:51:59.615970406Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:51:59.616673 env[1471]: time="2024-07-02T01:51:59.616640488Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:adcb19ea66141abcd7dc426e3205f2e6ff26e524a3f7148c97f3d49933f502ee\"" Jul 2 01:51:59.621919 env[1471]: time="2024-07-02T01:51:59.621883136Z" level=info msg="CreateContainer within sandbox \"d798c18fc4fb48c6ecfe4270d428b632c17582fc3ced3e2e97e5b7d9298a6449\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 01:51:59.651146 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3026281245.mount: Deactivated successfully. Jul 2 01:51:59.666595 env[1471]: time="2024-07-02T01:51:59.666534732Z" level=info msg="CreateContainer within sandbox \"d798c18fc4fb48c6ecfe4270d428b632c17582fc3ced3e2e97e5b7d9298a6449\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"154b624a5c5ae8a2de05a3894f15ae679acbdba1b12419b2ebbc4eba9d948d69\"" Jul 2 01:51:59.668697 env[1471]: time="2024-07-02T01:51:59.667130129Z" level=info msg="StartContainer for \"154b624a5c5ae8a2de05a3894f15ae679acbdba1b12419b2ebbc4eba9d948d69\"" Jul 2 01:51:59.692712 systemd[1]: Started cri-containerd-154b624a5c5ae8a2de05a3894f15ae679acbdba1b12419b2ebbc4eba9d948d69.scope. Jul 2 01:51:59.711000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.716989 kernel: kauditd_printk_skb: 265 callbacks suppressed Jul 2 01:51:59.717085 kernel: audit: type=1400 audit(1719885119.711:1052): avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.711000 audit[3530]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3423 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.759632 kernel: audit: type=1300 audit(1719885119.711:1052): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3423 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.798486 kernel: audit: type=1327 audit(1719885119.711:1052): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346236323461356335616538613264653035613338393466313561 Jul 2 01:51:59.798557 kernel: audit: type=1400 audit(1719885119.718:1053): avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346236323461356335616538613264653035613338393466313561 Jul 2 01:51:59.718000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.718000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.817817 kernel: audit: type=1400 audit(1719885119.718:1053): avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.718000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.834634 kernel: audit: type=1400 audit(1719885119.718:1053): avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.718000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.851315 kernel: audit: type=1400 audit(1719885119.718:1053): avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.718000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.866764 kubelet[2592]: E0702 01:51:59.851665 2592 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m94hx" podUID="4b19f760-4591-4466-a6d7-b7bc3509cff0" Jul 2 01:51:59.868497 kernel: audit: type=1400 audit(1719885119.718:1053): avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.718000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.886940 kernel: audit: type=1400 audit(1719885119.718:1053): avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.718000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.904118 kernel: audit: type=1400 audit(1719885119.718:1053): avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.718000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.718000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.718000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.718000 audit: BPF prog-id=146 op=LOAD Jul 2 01:51:59.718000 audit[3530]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3423 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346236323461356335616538613264653035613338393466313561 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit: BPF prog-id=147 op=LOAD Jul 2 01:51:59.733000 audit[3530]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3423 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346236323461356335616538613264653035613338393466313561 Jul 2 01:51:59.733000 audit: BPF prog-id=147 op=UNLOAD Jul 2 01:51:59.733000 audit: BPF prog-id=146 op=UNLOAD Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { perfmon } for pid=3530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit[3530]: AVC avc: denied { bpf } for pid=3530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:51:59.733000 audit: BPF prog-id=148 op=LOAD Jul 2 01:51:59.733000 audit[3530]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3423 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:51:59.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346236323461356335616538613264653035613338393466313561 Jul 2 01:51:59.910153 env[1471]: time="2024-07-02T01:51:59.910122180Z" level=info msg="StartContainer for \"154b624a5c5ae8a2de05a3894f15ae679acbdba1b12419b2ebbc4eba9d948d69\" returns successfully" Jul 2 01:52:01.843934 kubelet[2592]: E0702 01:52:01.843843 2592 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m94hx" podUID="4b19f760-4591-4466-a6d7-b7bc3509cff0" Jul 2 01:52:02.616344 systemd[1]: cri-containerd-154b624a5c5ae8a2de05a3894f15ae679acbdba1b12419b2ebbc4eba9d948d69.scope: Deactivated successfully. Jul 2 01:52:02.620000 audit: BPF prog-id=148 op=UNLOAD Jul 2 01:52:02.641099 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-154b624a5c5ae8a2de05a3894f15ae679acbdba1b12419b2ebbc4eba9d948d69-rootfs.mount: Deactivated successfully. Jul 2 01:52:02.683812 kubelet[2592]: I0702 01:52:02.683752 2592 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 01:52:02.982016 kubelet[2592]: I0702 01:52:02.705084 2592 topology_manager.go:215] "Topology Admit Handler" podUID="1e47ed5c-1a3e-4277-98d5-103b81dcef2b" podNamespace="kube-system" podName="coredns-7db6d8ff4d-xcbn8" Jul 2 01:52:02.982016 kubelet[2592]: I0702 01:52:02.712342 2592 topology_manager.go:215] "Topology Admit Handler" podUID="31bbac7b-d469-4a58-b6c2-5c453b36ab78" podNamespace="kube-system" podName="coredns-7db6d8ff4d-vg76v" Jul 2 01:52:02.982016 kubelet[2592]: I0702 01:52:02.717831 2592 topology_manager.go:215] "Topology Admit Handler" podUID="f1e917b0-ac95-4417-b1c1-04e7278c5980" podNamespace="calico-system" podName="calico-kube-controllers-65f57d747f-5ftd6" Jul 2 01:52:02.982016 kubelet[2592]: W0702 01:52:02.724297 2592 reflector.go:547] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510.3.5-a-118aa0dcdb" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.5-a-118aa0dcdb' and this object Jul 2 01:52:02.982016 kubelet[2592]: E0702 01:52:02.724326 2592 reflector.go:150] object-"kube-system"/"coredns": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510.3.5-a-118aa0dcdb" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.5-a-118aa0dcdb' and this object Jul 2 01:52:02.982016 kubelet[2592]: I0702 01:52:02.820551 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9bzh7\" (UniqueName: \"kubernetes.io/projected/1e47ed5c-1a3e-4277-98d5-103b81dcef2b-kube-api-access-9bzh7\") pod \"coredns-7db6d8ff4d-xcbn8\" (UID: \"1e47ed5c-1a3e-4277-98d5-103b81dcef2b\") " pod="kube-system/coredns-7db6d8ff4d-xcbn8" Jul 2 01:52:02.711044 systemd[1]: Created slice kubepods-burstable-pod1e47ed5c_1a3e_4277_98d5_103b81dcef2b.slice. Jul 2 01:52:02.982622 kubelet[2592]: I0702 01:52:02.820669 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f1e917b0-ac95-4417-b1c1-04e7278c5980-tigera-ca-bundle\") pod \"calico-kube-controllers-65f57d747f-5ftd6\" (UID: \"f1e917b0-ac95-4417-b1c1-04e7278c5980\") " pod="calico-system/calico-kube-controllers-65f57d747f-5ftd6" Jul 2 01:52:02.982622 kubelet[2592]: I0702 01:52:02.820704 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k8sdc\" (UniqueName: \"kubernetes.io/projected/f1e917b0-ac95-4417-b1c1-04e7278c5980-kube-api-access-k8sdc\") pod \"calico-kube-controllers-65f57d747f-5ftd6\" (UID: \"f1e917b0-ac95-4417-b1c1-04e7278c5980\") " pod="calico-system/calico-kube-controllers-65f57d747f-5ftd6" Jul 2 01:52:02.982622 kubelet[2592]: I0702 01:52:02.820725 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1e47ed5c-1a3e-4277-98d5-103b81dcef2b-config-volume\") pod \"coredns-7db6d8ff4d-xcbn8\" (UID: \"1e47ed5c-1a3e-4277-98d5-103b81dcef2b\") " pod="kube-system/coredns-7db6d8ff4d-xcbn8" Jul 2 01:52:02.982622 kubelet[2592]: I0702 01:52:02.820786 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/31bbac7b-d469-4a58-b6c2-5c453b36ab78-config-volume\") pod \"coredns-7db6d8ff4d-vg76v\" (UID: \"31bbac7b-d469-4a58-b6c2-5c453b36ab78\") " pod="kube-system/coredns-7db6d8ff4d-vg76v" Jul 2 01:52:02.982622 kubelet[2592]: I0702 01:52:02.820802 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ctlsj\" (UniqueName: \"kubernetes.io/projected/31bbac7b-d469-4a58-b6c2-5c453b36ab78-kube-api-access-ctlsj\") pod \"coredns-7db6d8ff4d-vg76v\" (UID: \"31bbac7b-d469-4a58-b6c2-5c453b36ab78\") " pod="kube-system/coredns-7db6d8ff4d-vg76v" Jul 2 01:52:02.718127 systemd[1]: Created slice kubepods-burstable-pod31bbac7b_d469_4a58_b6c2_5c453b36ab78.slice. Jul 2 01:52:02.725729 systemd[1]: Created slice kubepods-besteffort-podf1e917b0_ac95_4417_b1c1_04e7278c5980.slice. Jul 2 01:52:03.285045 env[1471]: time="2024-07-02T01:52:03.284545596Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65f57d747f-5ftd6,Uid:f1e917b0-ac95-4417-b1c1-04e7278c5980,Namespace:calico-system,Attempt:0,}" Jul 2 01:52:03.848694 systemd[1]: Created slice kubepods-besteffort-pod4b19f760_4591_4466_a6d7_b7bc3509cff0.slice. Jul 2 01:52:03.849681 env[1471]: time="2024-07-02T01:52:03.849605597Z" level=info msg="shim disconnected" id=154b624a5c5ae8a2de05a3894f15ae679acbdba1b12419b2ebbc4eba9d948d69 Jul 2 01:52:03.849681 env[1471]: time="2024-07-02T01:52:03.849650399Z" level=warning msg="cleaning up after shim disconnected" id=154b624a5c5ae8a2de05a3894f15ae679acbdba1b12419b2ebbc4eba9d948d69 namespace=k8s.io Jul 2 01:52:03.849681 env[1471]: time="2024-07-02T01:52:03.849659960Z" level=info msg="cleaning up dead shim" Jul 2 01:52:03.857093 env[1471]: time="2024-07-02T01:52:03.857012195Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:52:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3579 runtime=io.containerd.runc.v2\n" Jul 2 01:52:03.858073 env[1471]: time="2024-07-02T01:52:03.857814243Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m94hx,Uid:4b19f760-4591-4466-a6d7-b7bc3509cff0,Namespace:calico-system,Attempt:0,}" Jul 2 01:52:03.883746 env[1471]: time="2024-07-02T01:52:03.883707537Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xcbn8,Uid:1e47ed5c-1a3e-4277-98d5-103b81dcef2b,Namespace:kube-system,Attempt:0,}" Jul 2 01:52:03.885685 env[1471]: time="2024-07-02T01:52:03.885653453Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-vg76v,Uid:31bbac7b-d469-4a58-b6c2-5c453b36ab78,Namespace:kube-system,Attempt:0,}" Jul 2 01:52:03.960907 env[1471]: time="2024-07-02T01:52:03.960808986Z" level=error msg="Failed to destroy network for sandbox \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:03.962973 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62-shm.mount: Deactivated successfully. Jul 2 01:52:03.964446 env[1471]: time="2024-07-02T01:52:03.964403799Z" level=error msg="encountered an error cleaning up failed sandbox \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:03.965164 env[1471]: time="2024-07-02T01:52:03.965129962Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65f57d747f-5ftd6,Uid:f1e917b0-ac95-4417-b1c1-04e7278c5980,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:03.965970 kubelet[2592]: E0702 01:52:03.965658 2592 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:03.965970 kubelet[2592]: E0702 01:52:03.965968 2592 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-65f57d747f-5ftd6" Jul 2 01:52:03.966093 kubelet[2592]: E0702 01:52:03.965988 2592 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-65f57d747f-5ftd6" Jul 2 01:52:03.966127 kubelet[2592]: E0702 01:52:03.966103 2592 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-65f57d747f-5ftd6_calico-system(f1e917b0-ac95-4417-b1c1-04e7278c5980)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-65f57d747f-5ftd6_calico-system(f1e917b0-ac95-4417-b1c1-04e7278c5980)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-65f57d747f-5ftd6" podUID="f1e917b0-ac95-4417-b1c1-04e7278c5980" Jul 2 01:52:03.983355 env[1471]: time="2024-07-02T01:52:03.983318679Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 01:52:03.984295 kubelet[2592]: I0702 01:52:03.984207 2592 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Jul 2 01:52:03.985657 env[1471]: time="2024-07-02T01:52:03.985630336Z" level=info msg="StopPodSandbox for \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\"" Jul 2 01:52:04.085535 env[1471]: time="2024-07-02T01:52:04.085429905Z" level=error msg="StopPodSandbox for \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\" failed" error="failed to destroy network for sandbox \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:04.086113 kubelet[2592]: E0702 01:52:04.085964 2592 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Jul 2 01:52:04.086113 kubelet[2592]: E0702 01:52:04.086013 2592 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62"} Jul 2 01:52:04.086113 kubelet[2592]: E0702 01:52:04.086048 2592 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f1e917b0-ac95-4417-b1c1-04e7278c5980\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 01:52:04.086113 kubelet[2592]: E0702 01:52:04.086073 2592 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f1e917b0-ac95-4417-b1c1-04e7278c5980\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-65f57d747f-5ftd6" podUID="f1e917b0-ac95-4417-b1c1-04e7278c5980" Jul 2 01:52:04.113743 env[1471]: time="2024-07-02T01:52:04.112992077Z" level=error msg="Failed to destroy network for sandbox \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:04.114317 env[1471]: time="2024-07-02T01:52:04.114284352Z" level=error msg="encountered an error cleaning up failed sandbox \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:04.114510 env[1471]: time="2024-07-02T01:52:04.114422800Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m94hx,Uid:4b19f760-4591-4466-a6d7-b7bc3509cff0,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:04.115129 kubelet[2592]: E0702 01:52:04.114799 2592 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:04.115129 kubelet[2592]: E0702 01:52:04.114857 2592 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-m94hx" Jul 2 01:52:04.115129 kubelet[2592]: E0702 01:52:04.114876 2592 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-m94hx" Jul 2 01:52:04.115263 kubelet[2592]: E0702 01:52:04.114911 2592 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-m94hx_calico-system(4b19f760-4591-4466-a6d7-b7bc3509cff0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-m94hx_calico-system(4b19f760-4591-4466-a6d7-b7bc3509cff0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-m94hx" podUID="4b19f760-4591-4466-a6d7-b7bc3509cff0" Jul 2 01:52:04.117576 env[1471]: time="2024-07-02T01:52:04.117542823Z" level=error msg="Failed to destroy network for sandbox \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:04.118073 env[1471]: time="2024-07-02T01:52:04.118042852Z" level=error msg="encountered an error cleaning up failed sandbox \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:04.118191 env[1471]: time="2024-07-02T01:52:04.118166739Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-vg76v,Uid:31bbac7b-d469-4a58-b6c2-5c453b36ab78,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:04.118759 kubelet[2592]: E0702 01:52:04.118503 2592 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:04.118759 kubelet[2592]: E0702 01:52:04.118541 2592 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-vg76v" Jul 2 01:52:04.118759 kubelet[2592]: E0702 01:52:04.118557 2592 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-vg76v" Jul 2 01:52:04.118897 kubelet[2592]: E0702 01:52:04.118593 2592 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-vg76v_kube-system(31bbac7b-d469-4a58-b6c2-5c453b36ab78)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-vg76v_kube-system(31bbac7b-d469-4a58-b6c2-5c453b36ab78)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-vg76v" podUID="31bbac7b-d469-4a58-b6c2-5c453b36ab78" Jul 2 01:52:04.127819 env[1471]: time="2024-07-02T01:52:04.127782502Z" level=error msg="Failed to destroy network for sandbox \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:04.128237 env[1471]: time="2024-07-02T01:52:04.128204846Z" level=error msg="encountered an error cleaning up failed sandbox \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:04.128404 env[1471]: time="2024-07-02T01:52:04.128377056Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xcbn8,Uid:1e47ed5c-1a3e-4277-98d5-103b81dcef2b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:04.130349 kubelet[2592]: E0702 01:52:04.128720 2592 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:04.130349 kubelet[2592]: E0702 01:52:04.128803 2592 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-xcbn8" Jul 2 01:52:04.130349 kubelet[2592]: E0702 01:52:04.128820 2592 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-xcbn8" Jul 2 01:52:04.130550 kubelet[2592]: E0702 01:52:04.128891 2592 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-xcbn8_kube-system(1e47ed5c-1a3e-4277-98d5-103b81dcef2b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-xcbn8_kube-system(1e47ed5c-1a3e-4277-98d5-103b81dcef2b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-xcbn8" podUID="1e47ed5c-1a3e-4277-98d5-103b81dcef2b" Jul 2 01:52:04.877286 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e-shm.mount: Deactivated successfully. Jul 2 01:52:04.995300 kubelet[2592]: I0702 01:52:04.995239 2592 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Jul 2 01:52:04.996181 env[1471]: time="2024-07-02T01:52:04.996149843Z" level=info msg="StopPodSandbox for \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\"" Jul 2 01:52:05.000384 kubelet[2592]: I0702 01:52:05.000333 2592 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Jul 2 01:52:05.001743 env[1471]: time="2024-07-02T01:52:05.001666405Z" level=info msg="StopPodSandbox for \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\"" Jul 2 01:52:05.003923 kubelet[2592]: I0702 01:52:05.003855 2592 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Jul 2 01:52:05.005685 env[1471]: time="2024-07-02T01:52:05.005600992Z" level=info msg="StopPodSandbox for \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\"" Jul 2 01:52:05.058017 env[1471]: time="2024-07-02T01:52:05.057924853Z" level=error msg="StopPodSandbox for \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\" failed" error="failed to destroy network for sandbox \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:05.058489 kubelet[2592]: E0702 01:52:05.058387 2592 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Jul 2 01:52:05.058758 kubelet[2592]: E0702 01:52:05.058593 2592 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e"} Jul 2 01:52:05.058758 kubelet[2592]: E0702 01:52:05.058632 2592 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4b19f760-4591-4466-a6d7-b7bc3509cff0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 01:52:05.058758 kubelet[2592]: E0702 01:52:05.058723 2592 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4b19f760-4591-4466-a6d7-b7bc3509cff0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-m94hx" podUID="4b19f760-4591-4466-a6d7-b7bc3509cff0" Jul 2 01:52:05.078043 env[1471]: time="2024-07-02T01:52:05.077985491Z" level=error msg="StopPodSandbox for \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\" failed" error="failed to destroy network for sandbox \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:05.078686 kubelet[2592]: E0702 01:52:05.078566 2592 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Jul 2 01:52:05.078686 kubelet[2592]: E0702 01:52:05.078671 2592 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81"} Jul 2 01:52:05.078813 kubelet[2592]: E0702 01:52:05.078712 2592 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"31bbac7b-d469-4a58-b6c2-5c453b36ab78\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 01:52:05.078813 kubelet[2592]: E0702 01:52:05.078735 2592 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"31bbac7b-d469-4a58-b6c2-5c453b36ab78\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-vg76v" podUID="31bbac7b-d469-4a58-b6c2-5c453b36ab78" Jul 2 01:52:05.112714 env[1471]: time="2024-07-02T01:52:05.112625411Z" level=error msg="StopPodSandbox for \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\" failed" error="failed to destroy network for sandbox \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 01:52:05.113159 kubelet[2592]: E0702 01:52:05.113073 2592 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Jul 2 01:52:05.113159 kubelet[2592]: E0702 01:52:05.113126 2592 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66"} Jul 2 01:52:05.113325 kubelet[2592]: E0702 01:52:05.113218 2592 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1e47ed5c-1a3e-4277-98d5-103b81dcef2b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 01:52:05.113325 kubelet[2592]: E0702 01:52:05.113242 2592 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1e47ed5c-1a3e-4277-98d5-103b81dcef2b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-xcbn8" podUID="1e47ed5c-1a3e-4277-98d5-103b81dcef2b" Jul 2 01:52:09.186106 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3034855454.mount: Deactivated successfully. Jul 2 01:52:09.784687 env[1471]: time="2024-07-02T01:52:09.784641619Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:09.791826 env[1471]: time="2024-07-02T01:52:09.791762371Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d80cbd636ae2754a08d04558f0436508a17d92258e4712cc4a6299f43497607f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:09.795171 env[1471]: time="2024-07-02T01:52:09.795140596Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:09.799418 env[1471]: time="2024-07-02T01:52:09.799386350Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:09.799825 env[1471]: time="2024-07-02T01:52:09.799770051Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:d80cbd636ae2754a08d04558f0436508a17d92258e4712cc4a6299f43497607f\"" Jul 2 01:52:09.817028 env[1471]: time="2024-07-02T01:52:09.816961836Z" level=info msg="CreateContainer within sandbox \"d798c18fc4fb48c6ecfe4270d428b632c17582fc3ced3e2e97e5b7d9298a6449\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 01:52:09.845314 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3215638937.mount: Deactivated successfully. Jul 2 01:52:09.861161 env[1471]: time="2024-07-02T01:52:09.861081941Z" level=info msg="CreateContainer within sandbox \"d798c18fc4fb48c6ecfe4270d428b632c17582fc3ced3e2e97e5b7d9298a6449\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"fe5f4b011fb321da004a2f0932688887bc1f262fc8bb40b5694f79900be66653\"" Jul 2 01:52:09.863071 env[1471]: time="2024-07-02T01:52:09.862550021Z" level=info msg="StartContainer for \"fe5f4b011fb321da004a2f0932688887bc1f262fc8bb40b5694f79900be66653\"" Jul 2 01:52:09.879644 systemd[1]: Started cri-containerd-fe5f4b011fb321da004a2f0932688887bc1f262fc8bb40b5694f79900be66653.scope. Jul 2 01:52:09.919014 kernel: kauditd_printk_skb: 34 callbacks suppressed Jul 2 01:52:09.919141 kernel: audit: type=1400 audit(1719885129.896:1059): avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.896000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.896000 audit[3809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3423 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:09.944490 kernel: audit: type=1300 audit(1719885129.896:1059): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3423 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:09.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665356634623031316662333231646130303461326630393332363838 Jul 2 01:52:09.896000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.984620 kernel: audit: type=1327 audit(1719885129.896:1059): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665356634623031316662333231646130303461326630393332363838 Jul 2 01:52:09.984696 kernel: audit: type=1400 audit(1719885129.896:1060): avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.896000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:10.001049 kernel: audit: type=1400 audit(1719885129.896:1060): avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.896000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:10.017620 kernel: audit: type=1400 audit(1719885129.896:1060): avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:10.017755 env[1471]: time="2024-07-02T01:52:10.008703329Z" level=info msg="StartContainer for \"fe5f4b011fb321da004a2f0932688887bc1f262fc8bb40b5694f79900be66653\" returns successfully" Jul 2 01:52:09.896000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:10.034335 kernel: audit: type=1400 audit(1719885129.896:1060): avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.896000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.896000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:10.084296 kernel: audit: type=1400 audit(1719885129.896:1060): avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:10.084378 kernel: audit: type=1400 audit(1719885129.896:1060): avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.896000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:10.102553 kernel: audit: type=1400 audit(1719885129.896:1060): avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.896000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.896000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.896000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.896000 audit: BPF prog-id=149 op=LOAD Jul 2 01:52:09.896000 audit[3809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3423 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:09.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665356634623031316662333231646130303461326630393332363838 Jul 2 01:52:09.901000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.901000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.901000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.901000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.901000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.901000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.901000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.901000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.901000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.901000 audit: BPF prog-id=150 op=LOAD Jul 2 01:52:09.901000 audit[3809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3423 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:09.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665356634623031316662333231646130303461326630393332363838 Jul 2 01:52:09.918000 audit: BPF prog-id=150 op=UNLOAD Jul 2 01:52:09.918000 audit: BPF prog-id=149 op=UNLOAD Jul 2 01:52:09.918000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.918000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.918000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.918000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.918000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.918000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.918000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.918000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.918000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.918000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:09.918000 audit: BPF prog-id=151 op=LOAD Jul 2 01:52:09.918000 audit[3809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3423 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:09.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665356634623031316662333231646130303461326630393332363838 Jul 2 01:52:10.394245 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 01:52:10.394498 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 01:52:11.723000 audit[3968]: AVC avc: denied { write } for pid=3968 comm="tee" name="fd" dev="proc" ino=25302 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:52:11.724000 audit[3970]: AVC avc: denied { write } for pid=3970 comm="tee" name="fd" dev="proc" ino=25305 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:52:11.726000 audit[3957]: AVC avc: denied { write } for pid=3957 comm="tee" name="fd" dev="proc" ino=25308 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:52:11.723000 audit[3968]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff07c19f8 a2=241 a3=1b6 items=1 ppid=3921 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:11.723000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 01:52:11.723000 audit: PATH item=0 name="/dev/fd/63" inode=26202 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:11.723000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:52:11.724000 audit[3970]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff9726a09 a2=241 a3=1b6 items=1 ppid=3924 pid=3970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:11.724000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 01:52:11.724000 audit: PATH item=0 name="/dev/fd/63" inode=26203 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:11.724000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:52:11.726000 audit[3957]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe3017a0a a2=241 a3=1b6 items=1 ppid=3917 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:11.726000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 01:52:11.726000 audit: PATH item=0 name="/dev/fd/63" inode=26189 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:11.726000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:52:11.746000 audit[3974]: AVC avc: denied { write } for pid=3974 comm="tee" name="fd" dev="proc" ino=26213 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:52:11.746000 audit[3974]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd14f8a08 a2=241 a3=1b6 items=1 ppid=3930 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:11.746000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 01:52:11.746000 audit: PATH item=0 name="/dev/fd/63" inode=26204 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:11.746000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:52:11.774000 audit[3985]: AVC avc: denied { write } for pid=3985 comm="tee" name="fd" dev="proc" ino=26222 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:52:11.774000 audit[3985]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc7b1ba08 a2=241 a3=1b6 items=1 ppid=3920 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:11.774000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 01:52:11.774000 audit: PATH item=0 name="/dev/fd/63" inode=26210 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:11.774000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:52:11.794000 audit[3978]: AVC avc: denied { write } for pid=3978 comm="tee" name="fd" dev="proc" ino=26226 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:52:11.794000 audit[3978]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffe1d4a08 a2=241 a3=1b6 items=1 ppid=3925 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:11.794000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 01:52:11.794000 audit: PATH item=0 name="/dev/fd/63" inode=26207 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:11.794000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:52:11.796000 audit[3990]: AVC avc: denied { write } for pid=3990 comm="tee" name="fd" dev="proc" ino=26230 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 01:52:11.796000 audit[3990]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe6f0a9f9 a2=241 a3=1b6 items=1 ppid=3939 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:11.796000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 01:52:11.796000 audit: PATH item=0 name="/dev/fd/63" inode=26218 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:52:11.796000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 01:52:14.784869 kubelet[2592]: I0702 01:52:14.784798 2592 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 01:52:14.796405 kubelet[2592]: I0702 01:52:14.796317 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-ssgjb" podStartSLOduration=6.947219313 podStartE2EDuration="20.796302975s" podCreationTimestamp="2024-07-02 01:51:54 +0000 UTC" firstStartedPulling="2024-07-02 01:51:55.951822771 +0000 UTC m=+31.228391430" lastFinishedPulling="2024-07-02 01:52:09.800906393 +0000 UTC m=+45.077475092" observedRunningTime="2024-07-02 01:52:10.036544362 +0000 UTC m=+45.313113101" watchObservedRunningTime="2024-07-02 01:52:14.796302975 +0000 UTC m=+50.072871674" Jul 2 01:52:14.811000 audit[4045]: NETFILTER_CFG table=filter:104 family=2 entries=15 op=nft_register_rule pid=4045 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:14.811000 audit[4045]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffde701be0 a2=0 a3=1 items=0 ppid=2729 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:14.811000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:14.812000 audit[4045]: NETFILTER_CFG table=nat:105 family=2 entries=19 op=nft_register_chain pid=4045 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:14.812000 audit[4045]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffde701be0 a2=0 a3=1 items=0 ppid=2729 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:14.812000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:15.844935 env[1471]: time="2024-07-02T01:52:15.844866280Z" level=info msg="StopPodSandbox for \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\"" Jul 2 01:52:15.936508 env[1471]: 2024-07-02 01:52:15.892 [INFO][4108] k8s.go 608: Cleaning up netns ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Jul 2 01:52:15.936508 env[1471]: 2024-07-02 01:52:15.892 [INFO][4108] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" iface="eth0" netns="/var/run/netns/cni-6f61ae5e-86ac-17bb-4034-c2b728fb68be" Jul 2 01:52:15.936508 env[1471]: 2024-07-02 01:52:15.892 [INFO][4108] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" iface="eth0" netns="/var/run/netns/cni-6f61ae5e-86ac-17bb-4034-c2b728fb68be" Jul 2 01:52:15.936508 env[1471]: 2024-07-02 01:52:15.892 [INFO][4108] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" iface="eth0" netns="/var/run/netns/cni-6f61ae5e-86ac-17bb-4034-c2b728fb68be" Jul 2 01:52:15.936508 env[1471]: 2024-07-02 01:52:15.892 [INFO][4108] k8s.go 615: Releasing IP address(es) ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Jul 2 01:52:15.936508 env[1471]: 2024-07-02 01:52:15.892 [INFO][4108] utils.go 188: Calico CNI releasing IP address ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Jul 2 01:52:15.936508 env[1471]: 2024-07-02 01:52:15.919 [INFO][4129] ipam_plugin.go 411: Releasing address using handleID ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" HandleID="k8s-pod-network.c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" Jul 2 01:52:15.936508 env[1471]: 2024-07-02 01:52:15.920 [INFO][4129] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:15.936508 env[1471]: 2024-07-02 01:52:15.920 [INFO][4129] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:15.936508 env[1471]: 2024-07-02 01:52:15.931 [WARNING][4129] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" HandleID="k8s-pod-network.c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" Jul 2 01:52:15.936508 env[1471]: 2024-07-02 01:52:15.931 [INFO][4129] ipam_plugin.go 439: Releasing address using workloadID ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" HandleID="k8s-pod-network.c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" Jul 2 01:52:15.936508 env[1471]: 2024-07-02 01:52:15.932 [INFO][4129] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:15.936508 env[1471]: 2024-07-02 01:52:15.933 [INFO][4108] k8s.go 621: Teardown processing complete. ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Jul 2 01:52:15.941198 systemd[1]: run-netns-cni\x2d6f61ae5e\x2d86ac\x2d17bb\x2d4034\x2dc2b728fb68be.mount: Deactivated successfully. Jul 2 01:52:15.943019 env[1471]: time="2024-07-02T01:52:15.942953844Z" level=info msg="TearDown network for sandbox \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\" successfully" Jul 2 01:52:15.943158 env[1471]: time="2024-07-02T01:52:15.943140613Z" level=info msg="StopPodSandbox for \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\" returns successfully" Jul 2 01:52:15.944083 env[1471]: time="2024-07-02T01:52:15.944022699Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-vg76v,Uid:31bbac7b-d469-4a58-b6c2-5c453b36ab78,Namespace:kube-system,Attempt:1,}" Jul 2 01:52:16.549020 kernel: kauditd_printk_skb: 74 callbacks suppressed Jul 2 01:52:16.549146 kernel: audit: type=1400 audit(1719885136.541:1074): avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.541000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.572842 systemd-networkd[1624]: vxlan.calico: Link UP Jul 2 01:52:16.572848 systemd-networkd[1624]: vxlan.calico: Gained carrier Jul 2 01:52:16.541000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.593318 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 01:52:16.593436 kernel: audit: type=1400 audit(1719885136.541:1074): avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.541000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.609749 kernel: audit: type=1400 audit(1719885136.541:1074): avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.610080 kernel: audit: type=1400 audit(1719885136.541:1074): avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.541000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.631900 kernel: audit: audit_lost=22 audit_rate_limit=0 audit_backlog_limit=64 Jul 2 01:52:16.631988 kernel: audit: type=1400 audit(1719885136.541:1074): avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.541000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.654518 kernel: audit: backlog limit exceeded Jul 2 01:52:16.654633 kernel: audit: type=1400 audit(1719885136.541:1074): avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.541000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.675977 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 01:52:16.541000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.541000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.541000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.541000 audit: BPF prog-id=152 op=LOAD Jul 2 01:52:16.541000 audit[4154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffed8fec48 a2=70 a3=ffffed8fecb8 items=0 ppid=4080 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.541000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:52:16.569000 audit: BPF prog-id=152 op=UNLOAD Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit: BPF prog-id=153 op=LOAD Jul 2 01:52:16.569000 audit[4154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffed8fec48 a2=70 a3=4b243c items=0 ppid=4080 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.569000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:52:16.569000 audit: BPF prog-id=153 op=UNLOAD Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffed8fec00 a2=70 a3=ffffed8fec70 items=0 ppid=4080 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.569000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit: BPF prog-id=154 op=LOAD Jul 2 01:52:16.569000 audit[4154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffed8febe8 a2=70 a3=ffffed8fec58 items=0 ppid=4080 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.569000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:52:16.569000 audit: BPF prog-id=154 op=UNLOAD Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffed8fecb8 a2=70 a3=0 items=0 ppid=4080 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.569000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffed8feca8 a2=70 a3=0 items=0 ppid=4080 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.569000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:52:16.569000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.569000 audit[4154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffed8fec18 a2=70 a3=0 items=0 ppid=4080 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.569000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:52:16.571000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.571000 audit[4154]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffed8fecf0 a2=70 a3=877048f items=0 ppid=4080 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.571000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:52:16.571000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.571000 audit[4154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffed8fecf0 a2=70 a3=877048f items=0 ppid=4080 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.571000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:52:16.571000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.571000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.571000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.571000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.571000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.571000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.571000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.571000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.571000 audit: BPF prog-id=155 op=LOAD Jul 2 01:52:16.571000 audit[4154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffed8fec18 a2=70 a3=87704a9 items=0 ppid=4080 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.571000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 01:52:16.691000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.691000 audit[4171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd49ea808 a2=70 a3=ffffd49ea878 items=0 ppid=4080 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.691000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 01:52:16.692000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.692000 audit[4171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd49ea6d8 a2=70 a3=ffffd49ea748 items=0 ppid=4080 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.692000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 01:52:16.699000 audit: BPF prog-id=155 op=UNLOAD Jul 2 01:52:16.807936 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib3b67b8e399: link becomes ready Jul 2 01:52:16.809901 systemd-networkd[1624]: calib3b67b8e399: Link UP Jul 2 01:52:16.810640 systemd-networkd[1624]: calib3b67b8e399: Gained carrier Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.719 [INFO][4162] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0 coredns-7db6d8ff4d- kube-system 31bbac7b-d469-4a58-b6c2-5c453b36ab78 788 0 2024-07-02 01:51:41 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.5-a-118aa0dcdb coredns-7db6d8ff4d-vg76v eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib3b67b8e399 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-vg76v" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-" Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.719 [INFO][4162] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-vg76v" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.748 [INFO][4181] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" HandleID="k8s-pod-network.d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.761 [INFO][4181] ipam_plugin.go 264: Auto assigning IP ContainerID="d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" HandleID="k8s-pod-network.d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000265ed0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.5-a-118aa0dcdb", "pod":"coredns-7db6d8ff4d-vg76v", "timestamp":"2024-07-02 01:52:16.748796523 +0000 UTC"}, Hostname:"ci-3510.3.5-a-118aa0dcdb", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.761 [INFO][4181] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.761 [INFO][4181] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.761 [INFO][4181] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-118aa0dcdb' Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.763 [INFO][4181] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.766 [INFO][4181] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.770 [INFO][4181] ipam.go 489: Trying affinity for 192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.772 [INFO][4181] ipam.go 155: Attempting to load block cidr=192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.774 [INFO][4181] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.774 [INFO][4181] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.6.64/26 handle="k8s-pod-network.d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.775 [INFO][4181] ipam.go 1685: Creating new handle: k8s-pod-network.d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.780 [INFO][4181] ipam.go 1203: Writing block in order to claim IPs block=192.168.6.64/26 handle="k8s-pod-network.d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.784 [INFO][4181] ipam.go 1216: Successfully claimed IPs: [192.168.6.65/26] block=192.168.6.64/26 handle="k8s-pod-network.d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.784 [INFO][4181] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.6.65/26] handle="k8s-pod-network.d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.784 [INFO][4181] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:16.826578 env[1471]: 2024-07-02 01:52:16.784 [INFO][4181] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.6.65/26] IPv6=[] ContainerID="d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" HandleID="k8s-pod-network.d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" Jul 2 01:52:16.827202 env[1471]: 2024-07-02 01:52:16.791 [INFO][4162] k8s.go 386: Populated endpoint ContainerID="d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-vg76v" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"31bbac7b-d469-4a58-b6c2-5c453b36ab78", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"", Pod:"coredns-7db6d8ff4d-vg76v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.6.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib3b67b8e399", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:16.827202 env[1471]: 2024-07-02 01:52:16.791 [INFO][4162] k8s.go 387: Calico CNI using IPs: [192.168.6.65/32] ContainerID="d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-vg76v" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" Jul 2 01:52:16.827202 env[1471]: 2024-07-02 01:52:16.791 [INFO][4162] dataplane_linux.go 68: Setting the host side veth name to calib3b67b8e399 ContainerID="d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-vg76v" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" Jul 2 01:52:16.827202 env[1471]: 2024-07-02 01:52:16.792 [INFO][4162] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-vg76v" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" Jul 2 01:52:16.827202 env[1471]: 2024-07-02 01:52:16.812 [INFO][4162] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-vg76v" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"31bbac7b-d469-4a58-b6c2-5c453b36ab78", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f", Pod:"coredns-7db6d8ff4d-vg76v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.6.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib3b67b8e399", MAC:"7e:bc:a9:37:99:66", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:16.827202 env[1471]: 2024-07-02 01:52:16.824 [INFO][4162] k8s.go 500: Wrote updated endpoint to datastore ContainerID="d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f" Namespace="kube-system" Pod="coredns-7db6d8ff4d-vg76v" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" Jul 2 01:52:16.848620 env[1471]: time="2024-07-02T01:52:16.848573880Z" level=info msg="StopPodSandbox for \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\"" Jul 2 01:52:16.850875 env[1471]: time="2024-07-02T01:52:16.850778472Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:52:16.850875 env[1471]: time="2024-07-02T01:52:16.850820475Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:52:16.850875 env[1471]: time="2024-07-02T01:52:16.850830795Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:52:16.851195 env[1471]: time="2024-07-02T01:52:16.851131650Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f pid=4212 runtime=io.containerd.runc.v2 Jul 2 01:52:16.880619 systemd[1]: Started cri-containerd-d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f.scope. Jul 2 01:52:16.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.900000 audit: BPF prog-id=156 op=LOAD Jul 2 01:52:16.901000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.901000 audit[4243]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4212 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643737363730356662366634363436626563366162646532323963 Jul 2 01:52:16.901000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.901000 audit[4243]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4212 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643737363730356662366634363436626563366162646532323963 Jul 2 01:52:16.901000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.901000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.901000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.901000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.901000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.901000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.901000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.901000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.901000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.901000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.901000 audit: BPF prog-id=157 op=LOAD Jul 2 01:52:16.901000 audit[4243]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4212 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643737363730356662366634363436626563366162646532323963 Jul 2 01:52:16.902000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.902000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.902000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.902000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.902000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.902000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.902000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.902000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.902000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.902000 audit: BPF prog-id=158 op=LOAD Jul 2 01:52:16.902000 audit[4243]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4212 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643737363730356662366634363436626563366162646532323963 Jul 2 01:52:16.902000 audit: BPF prog-id=158 op=UNLOAD Jul 2 01:52:16.903000 audit: BPF prog-id=157 op=UNLOAD Jul 2 01:52:16.903000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.903000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.903000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.903000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.903000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.903000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.903000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.903000 audit[4243]: AVC avc: denied { perfmon } for pid=4243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.903000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.903000 audit[4243]: AVC avc: denied { bpf } for pid=4243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:16.903000 audit: BPF prog-id=159 op=LOAD Jul 2 01:52:16.903000 audit[4243]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4212 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643737363730356662366634363436626563366162646532323963 Jul 2 01:52:16.935181 env[1471]: time="2024-07-02T01:52:16.934881832Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-vg76v,Uid:31bbac7b-d469-4a58-b6c2-5c453b36ab78,Namespace:kube-system,Attempt:1,} returns sandbox id \"d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f\"" Jul 2 01:52:16.941214 systemd[1]: run-containerd-runc-k8s.io-d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f-runc.I8bohi.mount: Deactivated successfully. Jul 2 01:52:16.948724 env[1471]: time="2024-07-02T01:52:16.948669334Z" level=info msg="CreateContainer within sandbox \"d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 01:52:16.973000 audit[4281]: NETFILTER_CFG table=mangle:106 family=2 entries=16 op=nft_register_chain pid=4281 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:52:16.973000 audit[4281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffd76da350 a2=0 a3=ffff9636cfa8 items=0 ppid=4080 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:16.973000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:16.991643 env[1471]: 2024-07-02 01:52:16.920 [INFO][4238] k8s.go 608: Cleaning up netns ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Jul 2 01:52:16.991643 env[1471]: 2024-07-02 01:52:16.921 [INFO][4238] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" iface="eth0" netns="/var/run/netns/cni-49a49146-63d6-53ac-14e7-fca676cd36e9" Jul 2 01:52:16.991643 env[1471]: 2024-07-02 01:52:16.921 [INFO][4238] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" iface="eth0" netns="/var/run/netns/cni-49a49146-63d6-53ac-14e7-fca676cd36e9" Jul 2 01:52:16.991643 env[1471]: 2024-07-02 01:52:16.921 [INFO][4238] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" iface="eth0" netns="/var/run/netns/cni-49a49146-63d6-53ac-14e7-fca676cd36e9" Jul 2 01:52:16.991643 env[1471]: 2024-07-02 01:52:16.921 [INFO][4238] k8s.go 615: Releasing IP address(es) ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Jul 2 01:52:16.991643 env[1471]: 2024-07-02 01:52:16.921 [INFO][4238] utils.go 188: Calico CNI releasing IP address ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Jul 2 01:52:16.991643 env[1471]: 2024-07-02 01:52:16.965 [INFO][4265] ipam_plugin.go 411: Releasing address using handleID ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" HandleID="k8s-pod-network.bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" Jul 2 01:52:16.991643 env[1471]: 2024-07-02 01:52:16.965 [INFO][4265] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:16.991643 env[1471]: 2024-07-02 01:52:16.965 [INFO][4265] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:16.991643 env[1471]: 2024-07-02 01:52:16.980 [WARNING][4265] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" HandleID="k8s-pod-network.bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" Jul 2 01:52:16.991643 env[1471]: 2024-07-02 01:52:16.982 [INFO][4265] ipam_plugin.go 439: Releasing address using workloadID ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" HandleID="k8s-pod-network.bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" Jul 2 01:52:16.991643 env[1471]: 2024-07-02 01:52:16.984 [INFO][4265] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:16.991643 env[1471]: 2024-07-02 01:52:16.985 [INFO][4238] k8s.go 621: Teardown processing complete. ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Jul 2 01:52:16.991643 env[1471]: time="2024-07-02T01:52:16.987238857Z" level=info msg="TearDown network for sandbox \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\" successfully" Jul 2 01:52:16.991643 env[1471]: time="2024-07-02T01:52:16.987318221Z" level=info msg="StopPodSandbox for \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\" returns successfully" Jul 2 01:52:16.991643 env[1471]: time="2024-07-02T01:52:16.991142095Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xcbn8,Uid:1e47ed5c-1a3e-4277-98d5-103b81dcef2b,Namespace:kube-system,Attempt:1,}" Jul 2 01:52:17.003000 audit[4280]: NETFILTER_CFG table=raw:107 family=2 entries=19 op=nft_register_chain pid=4280 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:52:17.003000 audit[4280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffeb6a1370 a2=0 a3=ffff922b6fa8 items=0 ppid=4080 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.003000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:16.993887 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount356470200.mount: Deactivated successfully. Jul 2 01:52:16.993970 systemd[1]: run-netns-cni\x2d49a49146\x2d63d6\x2d53ac\x2d14e7\x2dfca676cd36e9.mount: Deactivated successfully. Jul 2 01:52:17.024056 env[1471]: time="2024-07-02T01:52:17.024004796Z" level=info msg="CreateContainer within sandbox \"d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"693666f0642605a67e874299ad530a576b3b913502cbfe643d35437340021fe1\"" Jul 2 01:52:17.024682 env[1471]: time="2024-07-02T01:52:17.024644908Z" level=info msg="StartContainer for \"693666f0642605a67e874299ad530a576b3b913502cbfe643d35437340021fe1\"" Jul 2 01:52:17.040430 systemd[1]: Started cri-containerd-693666f0642605a67e874299ad530a576b3b913502cbfe643d35437340021fe1.scope. Jul 2 01:52:17.056000 audit[4283]: NETFILTER_CFG table=nat:108 family=2 entries=15 op=nft_register_chain pid=4283 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:52:17.056000 audit[4283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffc9b3e3a0 a2=0 a3=ffff9e831fa8 items=0 ppid=4080 pid=4283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.056000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:17.057000 audit[4284]: NETFILTER_CFG table=filter:109 family=2 entries=39 op=nft_register_chain pid=4284 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:52:17.057000 audit[4284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffd5fd7170 a2=0 a3=ffff9b5b6fa8 items=0 ppid=4080 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.057000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:17.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.065000 audit: BPF prog-id=160 op=LOAD Jul 2 01:52:17.067000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.067000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4212 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639333636366630363432363035613637653837343239396164353330 Jul 2 01:52:17.067000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.067000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4212 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639333636366630363432363035613637653837343239396164353330 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit: BPF prog-id=161 op=LOAD Jul 2 01:52:17.068000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4212 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639333636366630363432363035613637653837343239396164353330 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.068000 audit: BPF prog-id=162 op=LOAD Jul 2 01:52:17.068000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4212 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639333636366630363432363035613637653837343239396164353330 Jul 2 01:52:17.069000 audit: BPF prog-id=162 op=UNLOAD Jul 2 01:52:17.069000 audit: BPF prog-id=161 op=UNLOAD Jul 2 01:52:17.069000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.069000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.069000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.069000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.069000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.069000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.069000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.069000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.069000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.069000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.069000 audit: BPF prog-id=163 op=LOAD Jul 2 01:52:17.069000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4212 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639333636366630363432363035613637653837343239396164353330 Jul 2 01:52:17.094941 env[1471]: time="2024-07-02T01:52:17.094899407Z" level=info msg="StartContainer for \"693666f0642605a67e874299ad530a576b3b913502cbfe643d35437340021fe1\" returns successfully" Jul 2 01:52:17.113000 audit[4341]: NETFILTER_CFG table=filter:110 family=2 entries=34 op=nft_register_chain pid=4341 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:52:17.113000 audit[4341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffc9833a90 a2=0 a3=ffffa797afa8 items=0 ppid=4080 pid=4341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.113000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:17.188805 systemd-networkd[1624]: cali826ab906294: Link UP Jul 2 01:52:17.196550 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali826ab906294: link becomes ready Jul 2 01:52:17.196367 systemd-networkd[1624]: cali826ab906294: Gained carrier Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.112 [INFO][4307] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0 coredns-7db6d8ff4d- kube-system 1e47ed5c-1a3e-4277-98d5-103b81dcef2b 796 0 2024-07-02 01:51:41 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.5-a-118aa0dcdb coredns-7db6d8ff4d-xcbn8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali826ab906294 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xcbn8" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-" Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.113 [INFO][4307] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xcbn8" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.145 [INFO][4342] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" HandleID="k8s-pod-network.e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.162 [INFO][4342] ipam_plugin.go 264: Auto assigning IP ContainerID="e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" HandleID="k8s-pod-network.e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002e5930), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.5-a-118aa0dcdb", "pod":"coredns-7db6d8ff4d-xcbn8", "timestamp":"2024-07-02 01:52:17.145352789 +0000 UTC"}, Hostname:"ci-3510.3.5-a-118aa0dcdb", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.162 [INFO][4342] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.162 [INFO][4342] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.162 [INFO][4342] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-118aa0dcdb' Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.164 [INFO][4342] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.167 [INFO][4342] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.171 [INFO][4342] ipam.go 489: Trying affinity for 192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.173 [INFO][4342] ipam.go 155: Attempting to load block cidr=192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.174 [INFO][4342] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.174 [INFO][4342] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.6.64/26 handle="k8s-pod-network.e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.176 [INFO][4342] ipam.go 1685: Creating new handle: k8s-pod-network.e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76 Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.178 [INFO][4342] ipam.go 1203: Writing block in order to claim IPs block=192.168.6.64/26 handle="k8s-pod-network.e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.184 [INFO][4342] ipam.go 1216: Successfully claimed IPs: [192.168.6.66/26] block=192.168.6.64/26 handle="k8s-pod-network.e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.184 [INFO][4342] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.6.66/26] handle="k8s-pod-network.e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.184 [INFO][4342] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:17.213951 env[1471]: 2024-07-02 01:52:17.184 [INFO][4342] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.6.66/26] IPv6=[] ContainerID="e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" HandleID="k8s-pod-network.e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" Jul 2 01:52:17.214588 env[1471]: 2024-07-02 01:52:17.186 [INFO][4307] k8s.go 386: Populated endpoint ContainerID="e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xcbn8" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"1e47ed5c-1a3e-4277-98d5-103b81dcef2b", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"", Pod:"coredns-7db6d8ff4d-xcbn8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.6.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali826ab906294", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:17.214588 env[1471]: 2024-07-02 01:52:17.186 [INFO][4307] k8s.go 387: Calico CNI using IPs: [192.168.6.66/32] ContainerID="e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xcbn8" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" Jul 2 01:52:17.214588 env[1471]: 2024-07-02 01:52:17.186 [INFO][4307] dataplane_linux.go 68: Setting the host side veth name to cali826ab906294 ContainerID="e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xcbn8" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" Jul 2 01:52:17.214588 env[1471]: 2024-07-02 01:52:17.197 [INFO][4307] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xcbn8" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" Jul 2 01:52:17.214588 env[1471]: 2024-07-02 01:52:17.201 [INFO][4307] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xcbn8" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"1e47ed5c-1a3e-4277-98d5-103b81dcef2b", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76", Pod:"coredns-7db6d8ff4d-xcbn8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.6.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali826ab906294", MAC:"66:20:fb:15:58:4b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:17.214588 env[1471]: 2024-07-02 01:52:17.211 [INFO][4307] k8s.go 500: Wrote updated endpoint to datastore ContainerID="e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xcbn8" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" Jul 2 01:52:17.226000 audit[4361]: NETFILTER_CFG table=filter:111 family=2 entries=30 op=nft_register_chain pid=4361 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:52:17.226000 audit[4361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17032 a0=3 a1=ffffea205f10 a2=0 a3=ffffbe65dfa8 items=0 ppid=4080 pid=4361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.226000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:17.232199 env[1471]: time="2024-07-02T01:52:17.232031116Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:52:17.232199 env[1471]: time="2024-07-02T01:52:17.232076998Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:52:17.232199 env[1471]: time="2024-07-02T01:52:17.232087318Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:52:17.232724 env[1471]: time="2024-07-02T01:52:17.232680828Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76 pid=4369 runtime=io.containerd.runc.v2 Jul 2 01:52:17.249860 systemd[1]: Started cri-containerd-e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76.scope. Jul 2 01:52:17.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.262000 audit: BPF prog-id=164 op=LOAD Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4369 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537366239326537396639343663653232653563663931646138366230 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4369 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537366239326537396639343663653232653563663931646138366230 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit: BPF prog-id=165 op=LOAD Jul 2 01:52:17.263000 audit[4380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4369 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537366239326537396639343663653232653563663931646138366230 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit: BPF prog-id=166 op=LOAD Jul 2 01:52:17.263000 audit[4380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4369 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537366239326537396639343663653232653563663931646138366230 Jul 2 01:52:17.263000 audit: BPF prog-id=166 op=UNLOAD Jul 2 01:52:17.263000 audit: BPF prog-id=165 op=UNLOAD Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.263000 audit: BPF prog-id=167 op=LOAD Jul 2 01:52:17.263000 audit[4380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4369 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537366239326537396639343663653232653563663931646138366230 Jul 2 01:52:17.282741 env[1471]: time="2024-07-02T01:52:17.282705028Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xcbn8,Uid:1e47ed5c-1a3e-4277-98d5-103b81dcef2b,Namespace:kube-system,Attempt:1,} returns sandbox id \"e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76\"" Jul 2 01:52:17.289854 env[1471]: time="2024-07-02T01:52:17.289821667Z" level=info msg="CreateContainer within sandbox \"e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 01:52:17.330199 env[1471]: time="2024-07-02T01:52:17.330098616Z" level=info msg="CreateContainer within sandbox \"e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a99bdfc5fd29a524792001fd932c9fb7c7db9bd9dafa9e2777b9276a822cff7d\"" Jul 2 01:52:17.330770 env[1471]: time="2024-07-02T01:52:17.330745009Z" level=info msg="StartContainer for \"a99bdfc5fd29a524792001fd932c9fb7c7db9bd9dafa9e2777b9276a822cff7d\"" Jul 2 01:52:17.347744 systemd[1]: Started cri-containerd-a99bdfc5fd29a524792001fd932c9fb7c7db9bd9dafa9e2777b9276a822cff7d.scope. Jul 2 01:52:17.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.370000 audit: BPF prog-id=168 op=LOAD Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4369 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139396264666335666432396135323437393230303166643933326339 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4369 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139396264666335666432396135323437393230303166643933326339 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit: BPF prog-id=169 op=LOAD Jul 2 01:52:17.371000 audit[4409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4369 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139396264666335666432396135323437393230303166643933326339 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit: BPF prog-id=170 op=LOAD Jul 2 01:52:17.371000 audit[4409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4369 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139396264666335666432396135323437393230303166643933326339 Jul 2 01:52:17.371000 audit: BPF prog-id=170 op=UNLOAD Jul 2 01:52:17.371000 audit: BPF prog-id=169 op=UNLOAD Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:17.371000 audit: BPF prog-id=171 op=LOAD Jul 2 01:52:17.371000 audit[4409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4369 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:17.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139396264666335666432396135323437393230303166643933326339 Jul 2 01:52:17.479708 env[1471]: time="2024-07-02T01:52:17.479647430Z" level=info msg="StartContainer for \"a99bdfc5fd29a524792001fd932c9fb7c7db9bd9dafa9e2777b9276a822cff7d\" returns successfully" Jul 2 01:52:17.981673 systemd-networkd[1624]: vxlan.calico: Gained IPv6LL Jul 2 01:52:18.061711 kubelet[2592]: I0702 01:52:18.061626 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-xcbn8" podStartSLOduration=37.061609957 podStartE2EDuration="37.061609957s" podCreationTimestamp="2024-07-02 01:51:41 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 01:52:18.052759356 +0000 UTC m=+53.329328015" watchObservedRunningTime="2024-07-02 01:52:18.061609957 +0000 UTC m=+53.338178657" Jul 2 01:52:18.062693 kubelet[2592]: I0702 01:52:18.062628 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-vg76v" podStartSLOduration=37.062618648 podStartE2EDuration="37.062618648s" podCreationTimestamp="2024-07-02 01:51:41 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 01:52:18.062439359 +0000 UTC m=+53.339008058" watchObservedRunningTime="2024-07-02 01:52:18.062618648 +0000 UTC m=+53.339187347" Jul 2 01:52:18.075000 audit[4442]: NETFILTER_CFG table=filter:112 family=2 entries=14 op=nft_register_rule pid=4442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:18.075000 audit[4442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffe5ca0bb0 a2=0 a3=1 items=0 ppid=2729 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:18.075000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:18.079000 audit[4442]: NETFILTER_CFG table=nat:113 family=2 entries=14 op=nft_register_rule pid=4442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:18.079000 audit[4442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffe5ca0bb0 a2=0 a3=1 items=0 ppid=2729 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:18.079000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:18.094000 audit[4444]: NETFILTER_CFG table=filter:114 family=2 entries=11 op=nft_register_rule pid=4444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:18.094000 audit[4444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc872fc70 a2=0 a3=1 items=0 ppid=2729 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:18.094000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:18.108000 audit[4444]: NETFILTER_CFG table=nat:115 family=2 entries=35 op=nft_register_chain pid=4444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:18.108000 audit[4444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffc872fc70 a2=0 a3=1 items=0 ppid=2729 pid=4444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:18.108000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:18.621659 systemd-networkd[1624]: calib3b67b8e399: Gained IPv6LL Jul 2 01:52:18.845613 env[1471]: time="2024-07-02T01:52:18.845512100Z" level=info msg="StopPodSandbox for \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\"" Jul 2 01:52:18.877588 systemd-networkd[1624]: cali826ab906294: Gained IPv6LL Jul 2 01:52:18.929381 env[1471]: 2024-07-02 01:52:18.894 [INFO][4459] k8s.go 608: Cleaning up netns ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Jul 2 01:52:18.929381 env[1471]: 2024-07-02 01:52:18.894 [INFO][4459] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" iface="eth0" netns="/var/run/netns/cni-3ae1ca41-d944-c840-7f79-e601db80361d" Jul 2 01:52:18.929381 env[1471]: 2024-07-02 01:52:18.894 [INFO][4459] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" iface="eth0" netns="/var/run/netns/cni-3ae1ca41-d944-c840-7f79-e601db80361d" Jul 2 01:52:18.929381 env[1471]: 2024-07-02 01:52:18.894 [INFO][4459] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" iface="eth0" netns="/var/run/netns/cni-3ae1ca41-d944-c840-7f79-e601db80361d" Jul 2 01:52:18.929381 env[1471]: 2024-07-02 01:52:18.894 [INFO][4459] k8s.go 615: Releasing IP address(es) ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Jul 2 01:52:18.929381 env[1471]: 2024-07-02 01:52:18.894 [INFO][4459] utils.go 188: Calico CNI releasing IP address ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Jul 2 01:52:18.929381 env[1471]: 2024-07-02 01:52:18.916 [INFO][4465] ipam_plugin.go 411: Releasing address using handleID ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" HandleID="k8s-pod-network.c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" Jul 2 01:52:18.929381 env[1471]: 2024-07-02 01:52:18.916 [INFO][4465] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:18.929381 env[1471]: 2024-07-02 01:52:18.916 [INFO][4465] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:18.929381 env[1471]: 2024-07-02 01:52:18.924 [WARNING][4465] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" HandleID="k8s-pod-network.c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" Jul 2 01:52:18.929381 env[1471]: 2024-07-02 01:52:18.925 [INFO][4465] ipam_plugin.go 439: Releasing address using workloadID ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" HandleID="k8s-pod-network.c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" Jul 2 01:52:18.929381 env[1471]: 2024-07-02 01:52:18.926 [INFO][4465] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:18.929381 env[1471]: 2024-07-02 01:52:18.928 [INFO][4459] k8s.go 621: Teardown processing complete. ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Jul 2 01:52:18.929381 env[1471]: time="2024-07-02T01:52:18.932588564Z" level=info msg="TearDown network for sandbox \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\" successfully" Jul 2 01:52:18.929381 env[1471]: time="2024-07-02T01:52:18.932629486Z" level=info msg="StopPodSandbox for \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\" returns successfully" Jul 2 01:52:18.933678 env[1471]: time="2024-07-02T01:52:18.933200434Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65f57d747f-5ftd6,Uid:f1e917b0-ac95-4417-b1c1-04e7278c5980,Namespace:calico-system,Attempt:1,}" Jul 2 01:52:18.931793 systemd[1]: run-netns-cni\x2d3ae1ca41\x2dd944\x2dc840\x2d7f79\x2de601db80361d.mount: Deactivated successfully. Jul 2 01:52:19.100673 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:52:19.100858 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicfb641af291: link becomes ready Jul 2 01:52:19.102633 systemd-networkd[1624]: calicfb641af291: Link UP Jul 2 01:52:19.102811 systemd-networkd[1624]: calicfb641af291: Gained carrier Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.005 [INFO][4472] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0 calico-kube-controllers-65f57d747f- calico-system f1e917b0-ac95-4417-b1c1-04e7278c5980 823 0 2024-07-02 01:51:49 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:65f57d747f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.5-a-118aa0dcdb calico-kube-controllers-65f57d747f-5ftd6 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calicfb641af291 [] []}} ContainerID="48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" Namespace="calico-system" Pod="calico-kube-controllers-65f57d747f-5ftd6" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-" Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.005 [INFO][4472] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" Namespace="calico-system" Pod="calico-kube-controllers-65f57d747f-5ftd6" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.033 [INFO][4485] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" HandleID="k8s-pod-network.48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.051 [INFO][4485] ipam_plugin.go 264: Auto assigning IP ContainerID="48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" HandleID="k8s-pod-network.48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000265dc0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.5-a-118aa0dcdb", "pod":"calico-kube-controllers-65f57d747f-5ftd6", "timestamp":"2024-07-02 01:52:19.033202447 +0000 UTC"}, Hostname:"ci-3510.3.5-a-118aa0dcdb", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.051 [INFO][4485] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.052 [INFO][4485] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.052 [INFO][4485] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-118aa0dcdb' Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.054 [INFO][4485] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.058 [INFO][4485] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.066 [INFO][4485] ipam.go 489: Trying affinity for 192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.072 [INFO][4485] ipam.go 155: Attempting to load block cidr=192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.074 [INFO][4485] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.074 [INFO][4485] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.6.64/26 handle="k8s-pod-network.48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.077 [INFO][4485] ipam.go 1685: Creating new handle: k8s-pod-network.48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.081 [INFO][4485] ipam.go 1203: Writing block in order to claim IPs block=192.168.6.64/26 handle="k8s-pod-network.48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.085 [INFO][4485] ipam.go 1216: Successfully claimed IPs: [192.168.6.67/26] block=192.168.6.64/26 handle="k8s-pod-network.48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.085 [INFO][4485] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.6.67/26] handle="k8s-pod-network.48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.085 [INFO][4485] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:19.116296 env[1471]: 2024-07-02 01:52:19.085 [INFO][4485] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.6.67/26] IPv6=[] ContainerID="48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" HandleID="k8s-pod-network.48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" Jul 2 01:52:19.117099 env[1471]: 2024-07-02 01:52:19.087 [INFO][4472] k8s.go 386: Populated endpoint ContainerID="48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" Namespace="calico-system" Pod="calico-kube-controllers-65f57d747f-5ftd6" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0", GenerateName:"calico-kube-controllers-65f57d747f-", Namespace:"calico-system", SelfLink:"", UID:"f1e917b0-ac95-4417-b1c1-04e7278c5980", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65f57d747f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"", Pod:"calico-kube-controllers-65f57d747f-5ftd6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.6.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicfb641af291", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:19.117099 env[1471]: 2024-07-02 01:52:19.087 [INFO][4472] k8s.go 387: Calico CNI using IPs: [192.168.6.67/32] ContainerID="48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" Namespace="calico-system" Pod="calico-kube-controllers-65f57d747f-5ftd6" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" Jul 2 01:52:19.117099 env[1471]: 2024-07-02 01:52:19.087 [INFO][4472] dataplane_linux.go 68: Setting the host side veth name to calicfb641af291 ContainerID="48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" Namespace="calico-system" Pod="calico-kube-controllers-65f57d747f-5ftd6" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" Jul 2 01:52:19.117099 env[1471]: 2024-07-02 01:52:19.102 [INFO][4472] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" Namespace="calico-system" Pod="calico-kube-controllers-65f57d747f-5ftd6" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" Jul 2 01:52:19.117099 env[1471]: 2024-07-02 01:52:19.103 [INFO][4472] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" Namespace="calico-system" Pod="calico-kube-controllers-65f57d747f-5ftd6" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0", GenerateName:"calico-kube-controllers-65f57d747f-", Namespace:"calico-system", SelfLink:"", UID:"f1e917b0-ac95-4417-b1c1-04e7278c5980", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65f57d747f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b", Pod:"calico-kube-controllers-65f57d747f-5ftd6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.6.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicfb641af291", MAC:"46:4e:5c:6f:2e:3f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:19.117099 env[1471]: 2024-07-02 01:52:19.114 [INFO][4472] k8s.go 500: Wrote updated endpoint to datastore ContainerID="48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b" Namespace="calico-system" Pod="calico-kube-controllers-65f57d747f-5ftd6" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" Jul 2 01:52:19.135895 env[1471]: time="2024-07-02T01:52:19.133420718Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:52:19.135895 env[1471]: time="2024-07-02T01:52:19.133512082Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:52:19.135895 env[1471]: time="2024-07-02T01:52:19.133523083Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:52:19.135895 env[1471]: time="2024-07-02T01:52:19.133670690Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b pid=4513 runtime=io.containerd.runc.v2 Jul 2 01:52:19.150000 audit[4523]: NETFILTER_CFG table=filter:116 family=2 entries=42 op=nft_register_chain pid=4523 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:52:19.150000 audit[4523]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21524 a0=3 a1=ffffdc7f4620 a2=0 a3=ffff98a52fa8 items=0 ppid=4080 pid=4523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:19.150000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:19.164642 systemd[1]: Started cri-containerd-48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b.scope. Jul 2 01:52:19.151000 audit[4524]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=4524 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:19.151000 audit[4524]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc97c6aa0 a2=0 a3=1 items=0 ppid=2729 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:19.151000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:19.188000 audit[4524]: NETFILTER_CFG table=nat:118 family=2 entries=56 op=nft_register_chain pid=4524 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:19.188000 audit[4524]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffc97c6aa0 a2=0 a3=1 items=0 ppid=2729 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:19.188000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:19.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.195000 audit: BPF prog-id=172 op=LOAD Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=4513 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:19.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438626334363661343232366463656437333965623932343536343836 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=4513 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:19.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438626334363661343232366463656437333965623932343536343836 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit: BPF prog-id=173 op=LOAD Jul 2 01:52:19.196000 audit[4525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=4513 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:19.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438626334363661343232366463656437333965623932343536343836 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit: BPF prog-id=174 op=LOAD Jul 2 01:52:19.196000 audit[4525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=4513 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:19.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438626334363661343232366463656437333965623932343536343836 Jul 2 01:52:19.196000 audit: BPF prog-id=174 op=UNLOAD Jul 2 01:52:19.196000 audit: BPF prog-id=173 op=UNLOAD Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:19.196000 audit: BPF prog-id=175 op=LOAD Jul 2 01:52:19.196000 audit[4525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=4513 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:19.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438626334363661343232366463656437333965623932343536343836 Jul 2 01:52:19.244968 env[1471]: time="2024-07-02T01:52:19.244928146Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65f57d747f-5ftd6,Uid:f1e917b0-ac95-4417-b1c1-04e7278c5980,Namespace:calico-system,Attempt:1,} returns sandbox id \"48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b\"" Jul 2 01:52:19.248257 env[1471]: time="2024-07-02T01:52:19.248193108Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\"" Jul 2 01:52:19.963290 systemd[1]: run-containerd-runc-k8s.io-48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b-runc.6ML5Il.mount: Deactivated successfully. Jul 2 01:52:20.735578 systemd-networkd[1624]: calicfb641af291: Gained IPv6LL Jul 2 01:52:20.845233 env[1471]: time="2024-07-02T01:52:20.845194570Z" level=info msg="StopPodSandbox for \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\"" Jul 2 01:52:21.013806 env[1471]: 2024-07-02 01:52:20.932 [INFO][4565] k8s.go 608: Cleaning up netns ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Jul 2 01:52:21.013806 env[1471]: 2024-07-02 01:52:20.932 [INFO][4565] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" iface="eth0" netns="/var/run/netns/cni-7b35fd8e-9896-6fb6-9153-375374448894" Jul 2 01:52:21.013806 env[1471]: 2024-07-02 01:52:20.932 [INFO][4565] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" iface="eth0" netns="/var/run/netns/cni-7b35fd8e-9896-6fb6-9153-375374448894" Jul 2 01:52:21.013806 env[1471]: 2024-07-02 01:52:20.932 [INFO][4565] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" iface="eth0" netns="/var/run/netns/cni-7b35fd8e-9896-6fb6-9153-375374448894" Jul 2 01:52:21.013806 env[1471]: 2024-07-02 01:52:20.932 [INFO][4565] k8s.go 615: Releasing IP address(es) ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Jul 2 01:52:21.013806 env[1471]: 2024-07-02 01:52:20.932 [INFO][4565] utils.go 188: Calico CNI releasing IP address ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Jul 2 01:52:21.013806 env[1471]: 2024-07-02 01:52:20.971 [INFO][4571] ipam_plugin.go 411: Releasing address using handleID ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" HandleID="k8s-pod-network.c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" Jul 2 01:52:21.013806 env[1471]: 2024-07-02 01:52:20.971 [INFO][4571] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:21.013806 env[1471]: 2024-07-02 01:52:20.971 [INFO][4571] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:21.013806 env[1471]: 2024-07-02 01:52:21.007 [WARNING][4571] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" HandleID="k8s-pod-network.c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" Jul 2 01:52:21.013806 env[1471]: 2024-07-02 01:52:21.007 [INFO][4571] ipam_plugin.go 439: Releasing address using workloadID ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" HandleID="k8s-pod-network.c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" Jul 2 01:52:21.013806 env[1471]: 2024-07-02 01:52:21.009 [INFO][4571] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:21.013806 env[1471]: 2024-07-02 01:52:21.012 [INFO][4565] k8s.go 621: Teardown processing complete. ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Jul 2 01:52:21.016535 systemd[1]: run-netns-cni\x2d7b35fd8e\x2d9896\x2d6fb6\x2d9153\x2d375374448894.mount: Deactivated successfully. Jul 2 01:52:21.018010 env[1471]: time="2024-07-02T01:52:21.017775568Z" level=info msg="TearDown network for sandbox \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\" successfully" Jul 2 01:52:21.018010 env[1471]: time="2024-07-02T01:52:21.017815690Z" level=info msg="StopPodSandbox for \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\" returns successfully" Jul 2 01:52:21.021839 env[1471]: time="2024-07-02T01:52:21.021805043Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m94hx,Uid:4b19f760-4591-4466-a6d7-b7bc3509cff0,Namespace:calico-system,Attempt:1,}" Jul 2 01:52:21.304871 systemd-networkd[1624]: caliadb6d017705: Link UP Jul 2 01:52:21.318348 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:52:21.318725 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliadb6d017705: link becomes ready Jul 2 01:52:21.319097 systemd-networkd[1624]: caliadb6d017705: Gained carrier Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.125 [INFO][4577] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0 csi-node-driver- calico-system 4b19f760-4591-4466-a6d7-b7bc3509cff0 832 0 2024-07-02 01:51:47 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6cc9df58f4 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.5-a-118aa0dcdb csi-node-driver-m94hx eth0 default [] [] [kns.calico-system ksa.calico-system.default] caliadb6d017705 [] []}} ContainerID="fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" Namespace="calico-system" Pod="csi-node-driver-m94hx" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-" Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.125 [INFO][4577] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" Namespace="calico-system" Pod="csi-node-driver-m94hx" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.163 [INFO][4588] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" HandleID="k8s-pod-network.fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.179 [INFO][4588] ipam_plugin.go 264: Auto assigning IP ContainerID="fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" HandleID="k8s-pod-network.fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002edaa0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.5-a-118aa0dcdb", "pod":"csi-node-driver-m94hx", "timestamp":"2024-07-02 01:52:21.163518114 +0000 UTC"}, Hostname:"ci-3510.3.5-a-118aa0dcdb", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.179 [INFO][4588] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.179 [INFO][4588] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.179 [INFO][4588] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-118aa0dcdb' Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.182 [INFO][4588] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.213 [INFO][4588] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.235 [INFO][4588] ipam.go 489: Trying affinity for 192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.250 [INFO][4588] ipam.go 155: Attempting to load block cidr=192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.252 [INFO][4588] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.252 [INFO][4588] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.6.64/26 handle="k8s-pod-network.fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.254 [INFO][4588] ipam.go 1685: Creating new handle: k8s-pod-network.fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9 Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.275 [INFO][4588] ipam.go 1203: Writing block in order to claim IPs block=192.168.6.64/26 handle="k8s-pod-network.fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.296 [INFO][4588] ipam.go 1216: Successfully claimed IPs: [192.168.6.68/26] block=192.168.6.64/26 handle="k8s-pod-network.fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.297 [INFO][4588] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.6.68/26] handle="k8s-pod-network.fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.297 [INFO][4588] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:21.340594 env[1471]: 2024-07-02 01:52:21.297 [INFO][4588] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.6.68/26] IPv6=[] ContainerID="fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" HandleID="k8s-pod-network.fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" Jul 2 01:52:21.341172 env[1471]: 2024-07-02 01:52:21.298 [INFO][4577] k8s.go 386: Populated endpoint ContainerID="fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" Namespace="calico-system" Pod="csi-node-driver-m94hx" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4b19f760-4591-4466-a6d7-b7bc3509cff0", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"", Pod:"csi-node-driver-m94hx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.6.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliadb6d017705", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:21.341172 env[1471]: 2024-07-02 01:52:21.298 [INFO][4577] k8s.go 387: Calico CNI using IPs: [192.168.6.68/32] ContainerID="fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" Namespace="calico-system" Pod="csi-node-driver-m94hx" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" Jul 2 01:52:21.341172 env[1471]: 2024-07-02 01:52:21.298 [INFO][4577] dataplane_linux.go 68: Setting the host side veth name to caliadb6d017705 ContainerID="fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" Namespace="calico-system" Pod="csi-node-driver-m94hx" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" Jul 2 01:52:21.341172 env[1471]: 2024-07-02 01:52:21.319 [INFO][4577] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" Namespace="calico-system" Pod="csi-node-driver-m94hx" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" Jul 2 01:52:21.341172 env[1471]: 2024-07-02 01:52:21.319 [INFO][4577] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" Namespace="calico-system" Pod="csi-node-driver-m94hx" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4b19f760-4591-4466-a6d7-b7bc3509cff0", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9", Pod:"csi-node-driver-m94hx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.6.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliadb6d017705", MAC:"fa:d4:f0:67:f2:08", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:21.341172 env[1471]: 2024-07-02 01:52:21.336 [INFO][4577] k8s.go 500: Wrote updated endpoint to datastore ContainerID="fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9" Namespace="calico-system" Pod="csi-node-driver-m94hx" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" Jul 2 01:52:21.381000 audit[4608]: NETFILTER_CFG table=filter:119 family=2 entries=42 op=nft_register_chain pid=4608 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:52:21.381000 audit[4608]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21016 a0=3 a1=ffffdf3445c0 a2=0 a3=ffffb95dbfa8 items=0 ppid=4080 pid=4608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:21.381000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:21.405948 env[1471]: time="2024-07-02T01:52:21.403825806Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:52:21.405948 env[1471]: time="2024-07-02T01:52:21.403865888Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:52:21.405948 env[1471]: time="2024-07-02T01:52:21.403875688Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:52:21.407688 env[1471]: time="2024-07-02T01:52:21.406482655Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9 pid=4614 runtime=io.containerd.runc.v2 Jul 2 01:52:21.452348 systemd[1]: Started cri-containerd-fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9.scope. Jul 2 01:52:21.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.529000 audit: BPF prog-id=176 op=LOAD Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4614 pid=4624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:21.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661383237623234326166363561316236613031386638353037393163 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4614 pid=4624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:21.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661383237623234326166363561316236613031386638353037393163 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit: BPF prog-id=177 op=LOAD Jul 2 01:52:21.530000 audit[4624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4614 pid=4624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:21.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661383237623234326166363561316236613031386638353037393163 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit: BPF prog-id=178 op=LOAD Jul 2 01:52:21.530000 audit[4624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4614 pid=4624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:21.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661383237623234326166363561316236613031386638353037393163 Jul 2 01:52:21.530000 audit: BPF prog-id=178 op=UNLOAD Jul 2 01:52:21.530000 audit: BPF prog-id=177 op=UNLOAD Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.530000 audit: BPF prog-id=179 op=LOAD Jul 2 01:52:21.530000 audit[4624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4614 pid=4624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:21.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661383237623234326166363561316236613031386638353037393163 Jul 2 01:52:21.552738 env[1471]: time="2024-07-02T01:52:21.552663503Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m94hx,Uid:4b19f760-4591-4466-a6d7-b7bc3509cff0,Namespace:calico-system,Attempt:1,} returns sandbox id \"fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9\"" Jul 2 01:52:21.672000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:21.696876 kernel: kauditd_printk_skb: 455 callbacks suppressed Jul 2 01:52:21.697016 kernel: audit: type=1400 audit(1719885141.672:1212): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:21.676000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:21.719764 kernel: audit: type=1400 audit(1719885141.676:1213): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:21.676000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001f76220 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:52:21.746530 kernel: audit: type=1300 audit(1719885141.676:1213): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001f76220 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:52:21.676000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:52:21.775471 kernel: audit: type=1327 audit(1719885141.676:1213): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:52:21.672000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001c1fe00 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:52:21.805184 kernel: audit: type=1300 audit(1719885141.672:1212): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001c1fe00 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:52:21.672000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:52:21.832369 kernel: audit: type=1327 audit(1719885141.672:1212): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:52:21.847194 env[1471]: time="2024-07-02T01:52:21.847151061Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:21.856344 env[1471]: time="2024-07-02T01:52:21.856306785Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:89df47edb6965978d3683de1cac38ee5b47d7054332bbea7cc0ef3b3c17da2e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:21.861060 env[1471]: time="2024-07-02T01:52:21.861028174Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:21.866067 env[1471]: time="2024-07-02T01:52:21.866034497Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c35e88abef622483409fff52313bf764a75095197be4c5a7c7830da342654de1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:21.866583 env[1471]: time="2024-07-02T01:52:21.866530121Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\" returns image reference \"sha256:89df47edb6965978d3683de1cac38ee5b47d7054332bbea7cc0ef3b3c17da2e1\"" Jul 2 01:52:21.868698 env[1471]: time="2024-07-02T01:52:21.868644063Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 01:52:21.879623 env[1471]: time="2024-07-02T01:52:21.879577154Z" level=info msg="CreateContainer within sandbox \"48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 2 01:52:21.917045 env[1471]: time="2024-07-02T01:52:21.916909124Z" level=info msg="CreateContainer within sandbox \"48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"a89b44eb3a285f58cd79831b28528b64b7cf78c02a7c1423c2a558436f1b0182\"" Jul 2 01:52:21.917734 env[1471]: time="2024-07-02T01:52:21.917678721Z" level=info msg="StartContainer for \"a89b44eb3a285f58cd79831b28528b64b7cf78c02a7c1423c2a558436f1b0182\"" Jul 2 01:52:21.932527 systemd[1]: Started cri-containerd-a89b44eb3a285f58cd79831b28528b64b7cf78c02a7c1423c2a558436f1b0182.scope. Jul 2 01:52:21.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.982838 kernel: audit: type=1400 audit(1719885141.950:1214): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.982949 kernel: audit: type=1400 audit(1719885141.950:1215): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:22.000581 kernel: audit: type=1400 audit(1719885141.950:1216): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:22.000699 kernel: audit: type=1400 audit(1719885141.950:1217): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:22.019212 systemd[1]: run-containerd-runc-k8s.io-fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9-runc.ybwdsR.mount: Deactivated successfully. Jul 2 01:52:21.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.965000 audit: BPF prog-id=180 op=LOAD Jul 2 01:52:21.981000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.981000 audit[4657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4513 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:21.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138396234346562336132383566353863643739383331623238353238 Jul 2 01:52:21.981000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.981000 audit[4657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4513 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:21.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138396234346562336132383566353863643739383331623238353238 Jul 2 01:52:21.981000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.981000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.981000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.981000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.981000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.981000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.981000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.981000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.981000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.981000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.981000 audit: BPF prog-id=181 op=LOAD Jul 2 01:52:21.981000 audit[4657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4513 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:21.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138396234346562336132383566353863643739383331623238353238 Jul 2 01:52:21.998000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.998000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.998000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.998000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.998000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.998000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.998000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.998000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.998000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:21.998000 audit: BPF prog-id=182 op=LOAD Jul 2 01:52:21.998000 audit[4657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4513 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:21.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138396234346562336132383566353863643739383331623238353238 Jul 2 01:52:21.999000 audit: BPF prog-id=182 op=UNLOAD Jul 2 01:52:21.999000 audit: BPF prog-id=181 op=UNLOAD Jul 2 01:52:22.016000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:22.016000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:22.016000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:22.016000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:22.016000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:22.016000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:22.016000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:22.016000 audit[4657]: AVC avc: denied { perfmon } for pid=4657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:22.016000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:22.016000 audit[4657]: AVC avc: denied { bpf } for pid=4657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:22.016000 audit: BPF prog-id=183 op=LOAD Jul 2 01:52:22.016000 audit[4657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4513 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:22.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138396234346562336132383566353863643739383331623238353238 Jul 2 01:52:22.061373 env[1471]: time="2024-07-02T01:52:22.057953664Z" level=info msg="StartContainer for \"a89b44eb3a285f58cd79831b28528b64b7cf78c02a7c1423c2a558436f1b0182\" returns successfully" Jul 2 01:52:22.091018 systemd[1]: run-containerd-runc-k8s.io-a89b44eb3a285f58cd79831b28528b64b7cf78c02a7c1423c2a558436f1b0182-runc.yxVgm9.mount: Deactivated successfully. Jul 2 01:52:22.141000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:22.141000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=4004412960 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:52:22.141000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:52:22.142000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521029 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:22.142000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=40044137a0 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:52:22.142000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:52:22.147000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:22.147000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=40068062a0 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:52:22.147000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:52:22.149000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:22.149000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=4006267020 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:52:22.149000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:52:22.284000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:22.284000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:22.284000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=400498c120 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:52:22.284000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:52:22.284000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4005c4e240 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:52:22.284000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:52:22.525680 systemd-networkd[1624]: caliadb6d017705: Gained IPv6LL Jul 2 01:52:23.003056 env[1471]: time="2024-07-02T01:52:23.003012073Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:23.011928 env[1471]: time="2024-07-02T01:52:23.011892976Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:94ad0dc71bacd91f470c20e61073c2dc00648fd583c0fb95657dee38af05e5ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:23.017155 env[1471]: time="2024-07-02T01:52:23.017121065Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:23.022988 env[1471]: time="2024-07-02T01:52:23.022956423Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:23.023184 env[1471]: time="2024-07-02T01:52:23.023155752Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:94ad0dc71bacd91f470c20e61073c2dc00648fd583c0fb95657dee38af05e5ed\"" Jul 2 01:52:23.031555 env[1471]: time="2024-07-02T01:52:23.028857824Z" level=info msg="CreateContainer within sandbox \"fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 01:52:23.061835 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1308864027.mount: Deactivated successfully. Jul 2 01:52:23.080826 env[1471]: time="2024-07-02T01:52:23.080777176Z" level=info msg="CreateContainer within sandbox \"fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"8394318657855ccc9182a4caa5e91f963ed867c8c6c019ade1614ac2c070819c\"" Jul 2 01:52:23.082940 env[1471]: time="2024-07-02T01:52:23.082910678Z" level=info msg="StartContainer for \"8394318657855ccc9182a4caa5e91f963ed867c8c6c019ade1614ac2c070819c\"" Jul 2 01:52:23.092370 systemd[1]: run-containerd-runc-k8s.io-a89b44eb3a285f58cd79831b28528b64b7cf78c02a7c1423c2a558436f1b0182-runc.vyM3LG.mount: Deactivated successfully. Jul 2 01:52:23.123169 systemd[1]: Started cri-containerd-8394318657855ccc9182a4caa5e91f963ed867c8c6c019ade1614ac2c070819c.scope. Jul 2 01:52:23.151898 kubelet[2592]: I0702 01:52:23.151829 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-65f57d747f-5ftd6" podStartSLOduration=31.531410567000002 podStartE2EDuration="34.15181124s" podCreationTimestamp="2024-07-02 01:51:49 +0000 UTC" firstStartedPulling="2024-07-02 01:52:19.247904734 +0000 UTC m=+54.524473433" lastFinishedPulling="2024-07-02 01:52:21.868305407 +0000 UTC m=+57.144874106" observedRunningTime="2024-07-02 01:52:22.081126497 +0000 UTC m=+57.357695196" watchObservedRunningTime="2024-07-02 01:52:23.15181124 +0000 UTC m=+58.428379899" Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=4614 pid=4728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:23.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833393433313836353738353563636339313832613463616135653931 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit: BPF prog-id=184 op=LOAD Jul 2 01:52:23.180000 audit[4728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=4614 pid=4728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:23.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833393433313836353738353563636339313832613463616135653931 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit: BPF prog-id=185 op=LOAD Jul 2 01:52:23.180000 audit[4728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=4614 pid=4728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:23.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833393433313836353738353563636339313832613463616135653931 Jul 2 01:52:23.180000 audit: BPF prog-id=185 op=UNLOAD Jul 2 01:52:23.180000 audit: BPF prog-id=184 op=UNLOAD Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { perfmon } for pid=4728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit[4728]: AVC avc: denied { bpf } for pid=4728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:23.180000 audit: BPF prog-id=186 op=LOAD Jul 2 01:52:23.180000 audit[4728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=4614 pid=4728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:23.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833393433313836353738353563636339313832613463616135653931 Jul 2 01:52:23.201032 env[1471]: time="2024-07-02T01:52:23.200987342Z" level=info msg="StartContainer for \"8394318657855ccc9182a4caa5e91f963ed867c8c6c019ade1614ac2c070819c\" returns successfully" Jul 2 01:52:23.202269 env[1471]: time="2024-07-02T01:52:23.202243802Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 01:52:24.374199 env[1471]: time="2024-07-02T01:52:24.374141703Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:24.383978 env[1471]: time="2024-07-02T01:52:24.383933686Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f708eddd5878891da5bc6148fc8bb3f7277210481a15957910fe5fb551a5ed28,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:24.389868 env[1471]: time="2024-07-02T01:52:24.389822484Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:24.396445 env[1471]: time="2024-07-02T01:52:24.396413595Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:24.397034 env[1471]: time="2024-07-02T01:52:24.397008183Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:f708eddd5878891da5bc6148fc8bb3f7277210481a15957910fe5fb551a5ed28\"" Jul 2 01:52:24.400357 env[1471]: time="2024-07-02T01:52:24.400328740Z" level=info msg="CreateContainer within sandbox \"fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 01:52:24.451435 env[1471]: time="2024-07-02T01:52:24.451386831Z" level=info msg="CreateContainer within sandbox \"fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"3d2b97c83f6944e4ef6e46935af9b2af62a581f5301bb03c4012bf1a74f7d554\"" Jul 2 01:52:24.452653 env[1471]: time="2024-07-02T01:52:24.452624769Z" level=info msg="StartContainer for \"3d2b97c83f6944e4ef6e46935af9b2af62a581f5301bb03c4012bf1a74f7d554\"" Jul 2 01:52:24.495000 systemd[1]: Started cri-containerd-3d2b97c83f6944e4ef6e46935af9b2af62a581f5301bb03c4012bf1a74f7d554.scope. Jul 2 01:52:24.515000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.515000 audit[4773]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4614 pid=4773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:24.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364326239376338336636393434653465663665343639333561663962 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit: BPF prog-id=187 op=LOAD Jul 2 01:52:24.516000 audit[4773]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4614 pid=4773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:24.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364326239376338336636393434653465663665343639333561663962 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit: BPF prog-id=188 op=LOAD Jul 2 01:52:24.516000 audit[4773]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4614 pid=4773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:24.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364326239376338336636393434653465663665343639333561663962 Jul 2 01:52:24.516000 audit: BPF prog-id=188 op=UNLOAD Jul 2 01:52:24.516000 audit: BPF prog-id=187 op=UNLOAD Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:24.516000 audit: BPF prog-id=189 op=LOAD Jul 2 01:52:24.516000 audit[4773]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4614 pid=4773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:24.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364326239376338336636393434653465663665343639333561663962 Jul 2 01:52:24.596364 env[1471]: time="2024-07-02T01:52:24.596312834Z" level=info msg="StartContainer for \"3d2b97c83f6944e4ef6e46935af9b2af62a581f5301bb03c4012bf1a74f7d554\" returns successfully" Jul 2 01:52:24.842281 env[1471]: time="2024-07-02T01:52:24.842245686Z" level=info msg="StopPodSandbox for \"2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2\"" Jul 2 01:52:24.842599 env[1471]: time="2024-07-02T01:52:24.842557821Z" level=info msg="TearDown network for sandbox \"2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2\" successfully" Jul 2 01:52:24.842695 env[1471]: time="2024-07-02T01:52:24.842678587Z" level=info msg="StopPodSandbox for \"2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2\" returns successfully" Jul 2 01:52:24.843157 env[1471]: time="2024-07-02T01:52:24.843133928Z" level=info msg="RemovePodSandbox for \"2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2\"" Jul 2 01:52:24.843288 env[1471]: time="2024-07-02T01:52:24.843255614Z" level=info msg="Forcibly stopping sandbox \"2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2\"" Jul 2 01:52:24.843406 env[1471]: time="2024-07-02T01:52:24.843387500Z" level=info msg="TearDown network for sandbox \"2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2\" successfully" Jul 2 01:52:24.856334 env[1471]: time="2024-07-02T01:52:24.856187064Z" level=info msg="RemovePodSandbox \"2cc97e6c21f9b60c5d95d2d0091e3f4c556d9a2a63169ca0a73b54f22e186ae2\" returns successfully" Jul 2 01:52:24.856922 env[1471]: time="2024-07-02T01:52:24.856882937Z" level=info msg="StopPodSandbox for \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\"" Jul 2 01:52:24.941657 env[1471]: 2024-07-02 01:52:24.897 [WARNING][4819] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0", GenerateName:"calico-kube-controllers-65f57d747f-", Namespace:"calico-system", SelfLink:"", UID:"f1e917b0-ac95-4417-b1c1-04e7278c5980", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65f57d747f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b", Pod:"calico-kube-controllers-65f57d747f-5ftd6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.6.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicfb641af291", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:24.941657 env[1471]: 2024-07-02 01:52:24.897 [INFO][4819] k8s.go 608: Cleaning up netns ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Jul 2 01:52:24.941657 env[1471]: 2024-07-02 01:52:24.897 [INFO][4819] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" iface="eth0" netns="" Jul 2 01:52:24.941657 env[1471]: 2024-07-02 01:52:24.897 [INFO][4819] k8s.go 615: Releasing IP address(es) ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Jul 2 01:52:24.941657 env[1471]: 2024-07-02 01:52:24.897 [INFO][4819] utils.go 188: Calico CNI releasing IP address ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Jul 2 01:52:24.941657 env[1471]: 2024-07-02 01:52:24.929 [INFO][4825] ipam_plugin.go 411: Releasing address using handleID ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" HandleID="k8s-pod-network.c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" Jul 2 01:52:24.941657 env[1471]: 2024-07-02 01:52:24.929 [INFO][4825] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:24.941657 env[1471]: 2024-07-02 01:52:24.929 [INFO][4825] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:24.941657 env[1471]: 2024-07-02 01:52:24.937 [WARNING][4825] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" HandleID="k8s-pod-network.c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" Jul 2 01:52:24.941657 env[1471]: 2024-07-02 01:52:24.937 [INFO][4825] ipam_plugin.go 439: Releasing address using workloadID ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" HandleID="k8s-pod-network.c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" Jul 2 01:52:24.941657 env[1471]: 2024-07-02 01:52:24.939 [INFO][4825] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:24.941657 env[1471]: 2024-07-02 01:52:24.940 [INFO][4819] k8s.go 621: Teardown processing complete. ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Jul 2 01:52:24.942117 env[1471]: time="2024-07-02T01:52:24.941679661Z" level=info msg="TearDown network for sandbox \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\" successfully" Jul 2 01:52:24.942117 env[1471]: time="2024-07-02T01:52:24.941751825Z" level=info msg="StopPodSandbox for \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\" returns successfully" Jul 2 01:52:24.942571 env[1471]: time="2024-07-02T01:52:24.942542182Z" level=info msg="RemovePodSandbox for \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\"" Jul 2 01:52:24.942675 env[1471]: time="2024-07-02T01:52:24.942578264Z" level=info msg="Forcibly stopping sandbox \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\"" Jul 2 01:52:25.131364 kernel: irq 12: nobody cared (try booting with the "irqpoll" option) Jul 2 01:52:25.131585 kernel: CPU: 0 PID: 4849 Comm: calico-ipam Not tainted 5.15.161-flatcar #1 Jul 2 01:52:25.131624 kernel: Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 11/28/2023 Jul 2 01:52:25.131645 kernel: Call trace: Jul 2 01:52:25.131667 kernel: dump_backtrace+0x0/0x1e4 Jul 2 01:52:25.131685 kernel: show_stack+0x18/0x2c Jul 2 01:52:25.131703 kernel: dump_stack_lvl+0x68/0x84 Jul 2 01:52:25.131720 kernel: dump_stack+0x18/0x34 Jul 2 01:52:25.131737 kernel: __report_bad_irq+0x4c/0xdc Jul 2 01:52:25.131754 kernel: note_interrupt+0x34c/0x3b0 Jul 2 01:52:25.131775 kernel: handle_irq_event+0xcc/0xfc Jul 2 01:52:25.131793 kernel: handle_fasteoi_irq+0xa4/0x1f4 Jul 2 01:52:25.131811 kernel: handle_domain_irq+0x60/0x90 Jul 2 01:52:25.131828 kernel: gic_handle_irq+0x54/0x130 Jul 2 01:52:25.131845 kernel: do_interrupt_handler+0x34/0x60 Jul 2 01:52:25.131862 kernel: el1_interrupt+0x30/0x80 Jul 2 01:52:25.131878 kernel: el1h_64_irq_handler+0x18/0x2c Jul 2 01:52:25.131894 kernel: el1h_64_irq+0x78/0x7c Jul 2 01:52:25.131909 kernel: handle_softirqs+0xa0/0x370 Jul 2 01:52:25.131929 kernel: __irq_exit_rcu+0xd0/0xec Jul 2 01:52:25.131946 kernel: irq_exit+0x10/0x20 Jul 2 01:52:25.131961 kernel: handle_domain_irq+0x64/0x90 Jul 2 01:52:25.131979 kernel: gic_handle_irq+0x54/0x130 Jul 2 01:52:25.131994 kernel: call_on_irq_stack+0x20/0x50 Jul 2 01:52:25.132013 kernel: do_interrupt_handler+0x54/0x60 Jul 2 01:52:25.132027 kernel: el0_interrupt+0x34/0xc0 Jul 2 01:52:25.132043 kernel: __el0_irq_handler_common+0x18/0x24 Jul 2 01:52:25.132061 kernel: el0t_64_irq_handler+0x10/0x20 Jul 2 01:52:25.132079 kernel: el0t_64_irq+0x1a0/0x1a4 Jul 2 01:52:25.132104 kernel: handlers: Jul 2 01:52:25.132122 kernel: [<000000001ea476e7>] pl011_int Jul 2 01:52:25.132209 kernel: Disabling IRQ #12 Jul 2 01:52:25.135515 systemd[1]: run-containerd-runc-k8s.io-3d2b97c83f6944e4ef6e46935af9b2af62a581f5301bb03c4012bf1a74f7d554-runc.9YexNF.mount: Deactivated successfully. Jul 2 01:52:25.171938 kubelet[2592]: I0702 01:52:25.150238 2592 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 01:52:25.171938 kubelet[2592]: I0702 01:52:25.150267 2592 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 01:52:25.172285 env[1471]: 2024-07-02 01:52:24.982 [WARNING][4843] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0", GenerateName:"calico-kube-controllers-65f57d747f-", Namespace:"calico-system", SelfLink:"", UID:"f1e917b0-ac95-4417-b1c1-04e7278c5980", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65f57d747f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"48bc466a4226dced739eb9245648691c24328d1cdd16a854bd3d25351b19db2b", Pod:"calico-kube-controllers-65f57d747f-5ftd6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.6.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicfb641af291", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:25.172285 env[1471]: 2024-07-02 01:52:24.982 [INFO][4843] k8s.go 608: Cleaning up netns ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Jul 2 01:52:25.172285 env[1471]: 2024-07-02 01:52:24.983 [INFO][4843] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" iface="eth0" netns="" Jul 2 01:52:25.172285 env[1471]: 2024-07-02 01:52:24.983 [INFO][4843] k8s.go 615: Releasing IP address(es) ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Jul 2 01:52:25.172285 env[1471]: 2024-07-02 01:52:24.983 [INFO][4843] utils.go 188: Calico CNI releasing IP address ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Jul 2 01:52:25.172285 env[1471]: 2024-07-02 01:52:25.142 [INFO][4849] ipam_plugin.go 411: Releasing address using handleID ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" HandleID="k8s-pod-network.c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" Jul 2 01:52:25.172285 env[1471]: 2024-07-02 01:52:25.142 [INFO][4849] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:25.172285 env[1471]: 2024-07-02 01:52:25.142 [INFO][4849] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:25.172285 env[1471]: 2024-07-02 01:52:25.152 [WARNING][4849] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" HandleID="k8s-pod-network.c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" Jul 2 01:52:25.172285 env[1471]: 2024-07-02 01:52:25.152 [INFO][4849] ipam_plugin.go 439: Releasing address using workloadID ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" HandleID="k8s-pod-network.c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--kube--controllers--65f57d747f--5ftd6-eth0" Jul 2 01:52:25.172285 env[1471]: 2024-07-02 01:52:25.154 [INFO][4849] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:25.172285 env[1471]: 2024-07-02 01:52:25.155 [INFO][4843] k8s.go 621: Teardown processing complete. ContainerID="c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62" Jul 2 01:52:25.172285 env[1471]: time="2024-07-02T01:52:25.157017087Z" level=info msg="TearDown network for sandbox \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\" successfully" Jul 2 01:52:25.172285 env[1471]: time="2024-07-02T01:52:25.171800099Z" level=info msg="RemovePodSandbox \"c2b39fcb91d5226b68745f7df4de78a680789e7df23e67e7c44edeca5bf43c62\" returns successfully" Jul 2 01:52:25.174129 env[1471]: time="2024-07-02T01:52:25.174097887Z" level=info msg="StopPodSandbox for \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\"" Jul 2 01:52:25.263733 env[1471]: 2024-07-02 01:52:25.224 [WARNING][4870] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4b19f760-4591-4466-a6d7-b7bc3509cff0", ResourceVersion:"868", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9", Pod:"csi-node-driver-m94hx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.6.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliadb6d017705", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:25.263733 env[1471]: 2024-07-02 01:52:25.225 [INFO][4870] k8s.go 608: Cleaning up netns ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Jul 2 01:52:25.263733 env[1471]: 2024-07-02 01:52:25.225 [INFO][4870] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" iface="eth0" netns="" Jul 2 01:52:25.263733 env[1471]: 2024-07-02 01:52:25.225 [INFO][4870] k8s.go 615: Releasing IP address(es) ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Jul 2 01:52:25.263733 env[1471]: 2024-07-02 01:52:25.225 [INFO][4870] utils.go 188: Calico CNI releasing IP address ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Jul 2 01:52:25.263733 env[1471]: 2024-07-02 01:52:25.248 [INFO][4876] ipam_plugin.go 411: Releasing address using handleID ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" HandleID="k8s-pod-network.c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" Jul 2 01:52:25.263733 env[1471]: 2024-07-02 01:52:25.248 [INFO][4876] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:25.263733 env[1471]: 2024-07-02 01:52:25.249 [INFO][4876] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:25.263733 env[1471]: 2024-07-02 01:52:25.258 [WARNING][4876] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" HandleID="k8s-pod-network.c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" Jul 2 01:52:25.263733 env[1471]: 2024-07-02 01:52:25.258 [INFO][4876] ipam_plugin.go 439: Releasing address using workloadID ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" HandleID="k8s-pod-network.c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" Jul 2 01:52:25.263733 env[1471]: 2024-07-02 01:52:25.261 [INFO][4876] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:25.263733 env[1471]: 2024-07-02 01:52:25.262 [INFO][4870] k8s.go 621: Teardown processing complete. ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Jul 2 01:52:25.264259 env[1471]: time="2024-07-02T01:52:25.263760805Z" level=info msg="TearDown network for sandbox \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\" successfully" Jul 2 01:52:25.264259 env[1471]: time="2024-07-02T01:52:25.263792046Z" level=info msg="StopPodSandbox for \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\" returns successfully" Jul 2 01:52:25.264801 env[1471]: time="2024-07-02T01:52:25.264766652Z" level=info msg="RemovePodSandbox for \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\"" Jul 2 01:52:25.264881 env[1471]: time="2024-07-02T01:52:25.264800254Z" level=info msg="Forcibly stopping sandbox \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\"" Jul 2 01:52:25.324886 systemd[1]: run-containerd-runc-k8s.io-fe5f4b011fb321da004a2f0932688887bc1f262fc8bb40b5694f79900be66653-runc.pKdNiG.mount: Deactivated successfully. Jul 2 01:52:25.353540 env[1471]: 2024-07-02 01:52:25.304 [WARNING][4894] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4b19f760-4591-4466-a6d7-b7bc3509cff0", ResourceVersion:"868", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"fa827b242af65a1b6a018f850791ce041e60b86d8ace36ef916e9a125bf26ad9", Pod:"csi-node-driver-m94hx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.6.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliadb6d017705", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:25.353540 env[1471]: 2024-07-02 01:52:25.304 [INFO][4894] k8s.go 608: Cleaning up netns ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Jul 2 01:52:25.353540 env[1471]: 2024-07-02 01:52:25.304 [INFO][4894] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" iface="eth0" netns="" Jul 2 01:52:25.353540 env[1471]: 2024-07-02 01:52:25.304 [INFO][4894] k8s.go 615: Releasing IP address(es) ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Jul 2 01:52:25.353540 env[1471]: 2024-07-02 01:52:25.304 [INFO][4894] utils.go 188: Calico CNI releasing IP address ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Jul 2 01:52:25.353540 env[1471]: 2024-07-02 01:52:25.338 [INFO][4906] ipam_plugin.go 411: Releasing address using handleID ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" HandleID="k8s-pod-network.c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" Jul 2 01:52:25.353540 env[1471]: 2024-07-02 01:52:25.338 [INFO][4906] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:25.353540 env[1471]: 2024-07-02 01:52:25.338 [INFO][4906] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:25.353540 env[1471]: 2024-07-02 01:52:25.349 [WARNING][4906] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" HandleID="k8s-pod-network.c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" Jul 2 01:52:25.353540 env[1471]: 2024-07-02 01:52:25.350 [INFO][4906] ipam_plugin.go 439: Releasing address using workloadID ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" HandleID="k8s-pod-network.c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-csi--node--driver--m94hx-eth0" Jul 2 01:52:25.353540 env[1471]: 2024-07-02 01:52:25.351 [INFO][4906] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:25.353540 env[1471]: 2024-07-02 01:52:25.352 [INFO][4894] k8s.go 621: Teardown processing complete. ContainerID="c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e" Jul 2 01:52:25.353975 env[1471]: time="2024-07-02T01:52:25.353560370Z" level=info msg="TearDown network for sandbox \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\" successfully" Jul 2 01:52:25.360872 env[1471]: time="2024-07-02T01:52:25.360817069Z" level=info msg="RemovePodSandbox \"c4549793ad206303a0510a93aa2211b02df39376664d825a40fda350487e5a3e\" returns successfully" Jul 2 01:52:25.361495 env[1471]: time="2024-07-02T01:52:25.361438898Z" level=info msg="StopPodSandbox for \"2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13\"" Jul 2 01:52:25.361590 env[1471]: time="2024-07-02T01:52:25.361547303Z" level=info msg="TearDown network for sandbox \"2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13\" successfully" Jul 2 01:52:25.361590 env[1471]: time="2024-07-02T01:52:25.361584745Z" level=info msg="StopPodSandbox for \"2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13\" returns successfully" Jul 2 01:52:25.362036 env[1471]: time="2024-07-02T01:52:25.362009765Z" level=info msg="RemovePodSandbox for \"2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13\"" Jul 2 01:52:25.362158 env[1471]: time="2024-07-02T01:52:25.362123290Z" level=info msg="Forcibly stopping sandbox \"2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13\"" Jul 2 01:52:25.362269 env[1471]: time="2024-07-02T01:52:25.362251256Z" level=info msg="TearDown network for sandbox \"2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13\" successfully" Jul 2 01:52:25.370516 env[1471]: time="2024-07-02T01:52:25.370472201Z" level=info msg="RemovePodSandbox \"2ae0fcb5b953bb0f45c2bf7c41fad045acae2c749aaed167e66f671ab5badf13\" returns successfully" Jul 2 01:52:25.371165 env[1471]: time="2024-07-02T01:52:25.371139633Z" level=info msg="StopPodSandbox for \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\"" Jul 2 01:52:25.429778 kubelet[2592]: I0702 01:52:25.429159 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-m94hx" podStartSLOduration=35.584869954 podStartE2EDuration="38.429139268s" podCreationTimestamp="2024-07-02 01:51:47 +0000 UTC" firstStartedPulling="2024-07-02 01:52:21.554289542 +0000 UTC m=+56.830858241" lastFinishedPulling="2024-07-02 01:52:24.398558856 +0000 UTC m=+59.675127555" observedRunningTime="2024-07-02 01:52:25.087584396 +0000 UTC m=+60.364153135" watchObservedRunningTime="2024-07-02 01:52:25.429139268 +0000 UTC m=+60.705707967" Jul 2 01:52:25.466400 env[1471]: 2024-07-02 01:52:25.417 [WARNING][4938] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"1e47ed5c-1a3e-4277-98d5-103b81dcef2b", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76", Pod:"coredns-7db6d8ff4d-xcbn8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.6.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali826ab906294", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:25.466400 env[1471]: 2024-07-02 01:52:25.419 [INFO][4938] k8s.go 608: Cleaning up netns ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Jul 2 01:52:25.466400 env[1471]: 2024-07-02 01:52:25.419 [INFO][4938] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" iface="eth0" netns="" Jul 2 01:52:25.466400 env[1471]: 2024-07-02 01:52:25.419 [INFO][4938] k8s.go 615: Releasing IP address(es) ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Jul 2 01:52:25.466400 env[1471]: 2024-07-02 01:52:25.419 [INFO][4938] utils.go 188: Calico CNI releasing IP address ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Jul 2 01:52:25.466400 env[1471]: 2024-07-02 01:52:25.455 [INFO][4948] ipam_plugin.go 411: Releasing address using handleID ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" HandleID="k8s-pod-network.bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" Jul 2 01:52:25.466400 env[1471]: 2024-07-02 01:52:25.455 [INFO][4948] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:25.466400 env[1471]: 2024-07-02 01:52:25.455 [INFO][4948] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:25.466400 env[1471]: 2024-07-02 01:52:25.463 [WARNING][4948] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" HandleID="k8s-pod-network.bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" Jul 2 01:52:25.466400 env[1471]: 2024-07-02 01:52:25.463 [INFO][4948] ipam_plugin.go 439: Releasing address using workloadID ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" HandleID="k8s-pod-network.bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" Jul 2 01:52:25.466400 env[1471]: 2024-07-02 01:52:25.464 [INFO][4948] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:25.466400 env[1471]: 2024-07-02 01:52:25.465 [INFO][4938] k8s.go 621: Teardown processing complete. ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Jul 2 01:52:25.467118 env[1471]: time="2024-07-02T01:52:25.467080605Z" level=info msg="TearDown network for sandbox \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\" successfully" Jul 2 01:52:25.467191 env[1471]: time="2024-07-02T01:52:25.467174089Z" level=info msg="StopPodSandbox for \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\" returns successfully" Jul 2 01:52:25.467771 env[1471]: time="2024-07-02T01:52:25.467744636Z" level=info msg="RemovePodSandbox for \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\"" Jul 2 01:52:25.468032 env[1471]: time="2024-07-02T01:52:25.467992487Z" level=info msg="Forcibly stopping sandbox \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\"" Jul 2 01:52:25.536282 env[1471]: 2024-07-02 01:52:25.502 [WARNING][4966] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"1e47ed5c-1a3e-4277-98d5-103b81dcef2b", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"e76b92e79f946ce22e5cf91da86b01266856f94013cbc795e7c2c63f1207bc76", Pod:"coredns-7db6d8ff4d-xcbn8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.6.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali826ab906294", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:25.536282 env[1471]: 2024-07-02 01:52:25.502 [INFO][4966] k8s.go 608: Cleaning up netns ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Jul 2 01:52:25.536282 env[1471]: 2024-07-02 01:52:25.502 [INFO][4966] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" iface="eth0" netns="" Jul 2 01:52:25.536282 env[1471]: 2024-07-02 01:52:25.502 [INFO][4966] k8s.go 615: Releasing IP address(es) ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Jul 2 01:52:25.536282 env[1471]: 2024-07-02 01:52:25.502 [INFO][4966] utils.go 188: Calico CNI releasing IP address ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Jul 2 01:52:25.536282 env[1471]: 2024-07-02 01:52:25.522 [INFO][4972] ipam_plugin.go 411: Releasing address using handleID ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" HandleID="k8s-pod-network.bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" Jul 2 01:52:25.536282 env[1471]: 2024-07-02 01:52:25.522 [INFO][4972] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:25.536282 env[1471]: 2024-07-02 01:52:25.522 [INFO][4972] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:25.536282 env[1471]: 2024-07-02 01:52:25.532 [WARNING][4972] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" HandleID="k8s-pod-network.bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" Jul 2 01:52:25.536282 env[1471]: 2024-07-02 01:52:25.532 [INFO][4972] ipam_plugin.go 439: Releasing address using workloadID ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" HandleID="k8s-pod-network.bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--xcbn8-eth0" Jul 2 01:52:25.536282 env[1471]: 2024-07-02 01:52:25.533 [INFO][4972] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:25.536282 env[1471]: 2024-07-02 01:52:25.535 [INFO][4966] k8s.go 621: Teardown processing complete. ContainerID="bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66" Jul 2 01:52:25.536872 env[1471]: time="2024-07-02T01:52:25.536827150Z" level=info msg="TearDown network for sandbox \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\" successfully" Jul 2 01:52:25.544225 env[1471]: time="2024-07-02T01:52:25.544177894Z" level=info msg="RemovePodSandbox \"bede6cd0e003b481ce02dc1d805fc82420513a4b8be80e04dddf0a03e842ad66\" returns successfully" Jul 2 01:52:25.544809 env[1471]: time="2024-07-02T01:52:25.544774642Z" level=info msg="StopPodSandbox for \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\"" Jul 2 01:52:25.608211 env[1471]: 2024-07-02 01:52:25.579 [WARNING][4990] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"31bbac7b-d469-4a58-b6c2-5c453b36ab78", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f", Pod:"coredns-7db6d8ff4d-vg76v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.6.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib3b67b8e399", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:25.608211 env[1471]: 2024-07-02 01:52:25.579 [INFO][4990] k8s.go 608: Cleaning up netns ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Jul 2 01:52:25.608211 env[1471]: 2024-07-02 01:52:25.579 [INFO][4990] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" iface="eth0" netns="" Jul 2 01:52:25.608211 env[1471]: 2024-07-02 01:52:25.579 [INFO][4990] k8s.go 615: Releasing IP address(es) ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Jul 2 01:52:25.608211 env[1471]: 2024-07-02 01:52:25.579 [INFO][4990] utils.go 188: Calico CNI releasing IP address ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Jul 2 01:52:25.608211 env[1471]: 2024-07-02 01:52:25.596 [INFO][4997] ipam_plugin.go 411: Releasing address using handleID ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" HandleID="k8s-pod-network.c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" Jul 2 01:52:25.608211 env[1471]: 2024-07-02 01:52:25.596 [INFO][4997] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:25.608211 env[1471]: 2024-07-02 01:52:25.596 [INFO][4997] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:25.608211 env[1471]: 2024-07-02 01:52:25.604 [WARNING][4997] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" HandleID="k8s-pod-network.c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" Jul 2 01:52:25.608211 env[1471]: 2024-07-02 01:52:25.604 [INFO][4997] ipam_plugin.go 439: Releasing address using workloadID ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" HandleID="k8s-pod-network.c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" Jul 2 01:52:25.608211 env[1471]: 2024-07-02 01:52:25.606 [INFO][4997] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:25.608211 env[1471]: 2024-07-02 01:52:25.607 [INFO][4990] k8s.go 621: Teardown processing complete. ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Jul 2 01:52:25.608913 env[1471]: time="2024-07-02T01:52:25.608875964Z" level=info msg="TearDown network for sandbox \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\" successfully" Jul 2 01:52:25.608993 env[1471]: time="2024-07-02T01:52:25.608974408Z" level=info msg="StopPodSandbox for \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\" returns successfully" Jul 2 01:52:25.609536 env[1471]: time="2024-07-02T01:52:25.609497193Z" level=info msg="RemovePodSandbox for \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\"" Jul 2 01:52:25.609615 env[1471]: time="2024-07-02T01:52:25.609538355Z" level=info msg="Forcibly stopping sandbox \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\"" Jul 2 01:52:25.674614 env[1471]: 2024-07-02 01:52:25.642 [WARNING][5016] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"31bbac7b-d469-4a58-b6c2-5c453b36ab78", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 51, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"d0d776705fb6f4646bec6abde229c5d6daa00154c3e81d0365afaedafec60c7f", Pod:"coredns-7db6d8ff4d-vg76v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.6.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib3b67b8e399", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:25.674614 env[1471]: 2024-07-02 01:52:25.643 [INFO][5016] k8s.go 608: Cleaning up netns ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Jul 2 01:52:25.674614 env[1471]: 2024-07-02 01:52:25.643 [INFO][5016] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" iface="eth0" netns="" Jul 2 01:52:25.674614 env[1471]: 2024-07-02 01:52:25.643 [INFO][5016] k8s.go 615: Releasing IP address(es) ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Jul 2 01:52:25.674614 env[1471]: 2024-07-02 01:52:25.643 [INFO][5016] utils.go 188: Calico CNI releasing IP address ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Jul 2 01:52:25.674614 env[1471]: 2024-07-02 01:52:25.660 [INFO][5023] ipam_plugin.go 411: Releasing address using handleID ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" HandleID="k8s-pod-network.c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" Jul 2 01:52:25.674614 env[1471]: 2024-07-02 01:52:25.661 [INFO][5023] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:25.674614 env[1471]: 2024-07-02 01:52:25.661 [INFO][5023] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:25.674614 env[1471]: 2024-07-02 01:52:25.669 [WARNING][5023] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" HandleID="k8s-pod-network.c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" Jul 2 01:52:25.674614 env[1471]: 2024-07-02 01:52:25.669 [INFO][5023] ipam_plugin.go 439: Releasing address using workloadID ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" HandleID="k8s-pod-network.c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-coredns--7db6d8ff4d--vg76v-eth0" Jul 2 01:52:25.674614 env[1471]: 2024-07-02 01:52:25.670 [INFO][5023] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:25.674614 env[1471]: 2024-07-02 01:52:25.671 [INFO][5016] k8s.go 621: Teardown processing complete. ContainerID="c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81" Jul 2 01:52:25.675271 env[1471]: time="2024-07-02T01:52:25.675219270Z" level=info msg="TearDown network for sandbox \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\" successfully" Jul 2 01:52:25.687672 env[1471]: time="2024-07-02T01:52:25.687572408Z" level=info msg="RemovePodSandbox \"c4504f8299e3ce1353c8e142fcb70f31b35d2e8b80cbdd85c3d23194833a4c81\" returns successfully" Jul 2 01:52:27.179492 kernel: kauditd_printk_skb: 157 callbacks suppressed Jul 2 01:52:27.179645 kernel: audit: type=1325 audit(1719885147.170:1250): table=filter:120 family=2 entries=9 op=nft_register_rule pid=5044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:27.170000 audit[5044]: NETFILTER_CFG table=filter:120 family=2 entries=9 op=nft_register_rule pid=5044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:27.170000 audit[5044]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffc677a10 a2=0 a3=1 items=0 ppid=2729 pid=5044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:27.192145 kubelet[2592]: I0702 01:52:27.192108 2592 topology_manager.go:215] "Topology Admit Handler" podUID="39370675-f91f-489d-a1dd-65cd846a6646" podNamespace="calico-apiserver" podName="calico-apiserver-7b884df94f-ls8db" Jul 2 01:52:27.214106 kernel: audit: type=1300 audit(1719885147.170:1250): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffc677a10 a2=0 a3=1 items=0 ppid=2729 pid=5044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:27.220222 systemd[1]: Created slice kubepods-besteffort-pod39370675_f91f_489d_a1dd_65cd846a6646.slice. Jul 2 01:52:27.170000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:27.234599 kernel: audit: type=1327 audit(1719885147.170:1250): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:27.170000 audit[5044]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=5044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:27.248198 kernel: audit: type=1325 audit(1719885147.170:1251): table=nat:121 family=2 entries=20 op=nft_register_rule pid=5044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:27.248334 kernel: audit: type=1300 audit(1719885147.170:1251): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffc677a10 a2=0 a3=1 items=0 ppid=2729 pid=5044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:27.170000 audit[5044]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffc677a10 a2=0 a3=1 items=0 ppid=2729 pid=5044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:27.170000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:27.285511 kernel: audit: type=1327 audit(1719885147.170:1251): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:27.290300 kubelet[2592]: I0702 01:52:27.290255 2592 topology_manager.go:215] "Topology Admit Handler" podUID="78d2739d-724c-4f72-aa96-cf00e30e55e5" podNamespace="calico-apiserver" podName="calico-apiserver-7b884df94f-vtld7" Jul 2 01:52:27.295059 systemd[1]: Created slice kubepods-besteffort-pod78d2739d_724c_4f72_aa96_cf00e30e55e5.slice. Jul 2 01:52:27.320000 audit[5046]: NETFILTER_CFG table=filter:122 family=2 entries=10 op=nft_register_rule pid=5046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:27.335507 kernel: audit: type=1325 audit(1719885147.320:1252): table=filter:122 family=2 entries=10 op=nft_register_rule pid=5046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:27.320000 audit[5046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff0c133d0 a2=0 a3=1 items=0 ppid=2729 pid=5046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:27.360573 kubelet[2592]: I0702 01:52:27.360535 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wrvdz\" (UniqueName: \"kubernetes.io/projected/39370675-f91f-489d-a1dd-65cd846a6646-kube-api-access-wrvdz\") pod \"calico-apiserver-7b884df94f-ls8db\" (UID: \"39370675-f91f-489d-a1dd-65cd846a6646\") " pod="calico-apiserver/calico-apiserver-7b884df94f-ls8db" Jul 2 01:52:27.360817 kubelet[2592]: I0702 01:52:27.360801 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/39370675-f91f-489d-a1dd-65cd846a6646-calico-apiserver-certs\") pod \"calico-apiserver-7b884df94f-ls8db\" (UID: \"39370675-f91f-489d-a1dd-65cd846a6646\") " pod="calico-apiserver/calico-apiserver-7b884df94f-ls8db" Jul 2 01:52:27.320000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:27.374594 kernel: audit: type=1300 audit(1719885147.320:1252): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff0c133d0 a2=0 a3=1 items=0 ppid=2729 pid=5046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:27.374741 kernel: audit: type=1327 audit(1719885147.320:1252): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:27.334000 audit[5046]: NETFILTER_CFG table=nat:123 family=2 entries=20 op=nft_register_rule pid=5046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:27.387282 kernel: audit: type=1325 audit(1719885147.334:1253): table=nat:123 family=2 entries=20 op=nft_register_rule pid=5046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:27.334000 audit[5046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff0c133d0 a2=0 a3=1 items=0 ppid=2729 pid=5046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:27.334000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:27.461933 kubelet[2592]: I0702 01:52:27.461820 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/78d2739d-724c-4f72-aa96-cf00e30e55e5-calico-apiserver-certs\") pod \"calico-apiserver-7b884df94f-vtld7\" (UID: \"78d2739d-724c-4f72-aa96-cf00e30e55e5\") " pod="calico-apiserver/calico-apiserver-7b884df94f-vtld7" Jul 2 01:52:27.461933 kubelet[2592]: I0702 01:52:27.461898 2592 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ddlzn\" (UniqueName: \"kubernetes.io/projected/78d2739d-724c-4f72-aa96-cf00e30e55e5-kube-api-access-ddlzn\") pod \"calico-apiserver-7b884df94f-vtld7\" (UID: \"78d2739d-724c-4f72-aa96-cf00e30e55e5\") " pod="calico-apiserver/calico-apiserver-7b884df94f-vtld7" Jul 2 01:52:27.462633 kubelet[2592]: E0702 01:52:27.462252 2592 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 01:52:27.462633 kubelet[2592]: E0702 01:52:27.462338 2592 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/39370675-f91f-489d-a1dd-65cd846a6646-calico-apiserver-certs podName:39370675-f91f-489d-a1dd-65cd846a6646 nodeName:}" failed. No retries permitted until 2024-07-02 01:52:27.96230673 +0000 UTC m=+63.238875429 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/39370675-f91f-489d-a1dd-65cd846a6646-calico-apiserver-certs") pod "calico-apiserver-7b884df94f-ls8db" (UID: "39370675-f91f-489d-a1dd-65cd846a6646") : secret "calico-apiserver-certs" not found Jul 2 01:52:27.562577 kubelet[2592]: E0702 01:52:27.562545 2592 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 01:52:27.562821 kubelet[2592]: E0702 01:52:27.562808 2592 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/78d2739d-724c-4f72-aa96-cf00e30e55e5-calico-apiserver-certs podName:78d2739d-724c-4f72-aa96-cf00e30e55e5 nodeName:}" failed. No retries permitted until 2024-07-02 01:52:28.062789599 +0000 UTC m=+63.339358298 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/78d2739d-724c-4f72-aa96-cf00e30e55e5-calico-apiserver-certs") pod "calico-apiserver-7b884df94f-vtld7" (UID: "78d2739d-724c-4f72-aa96-cf00e30e55e5") : secret "calico-apiserver-certs" not found Jul 2 01:52:27.965479 kubelet[2592]: E0702 01:52:27.965417 2592 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 01:52:27.965650 kubelet[2592]: E0702 01:52:27.965513 2592 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/39370675-f91f-489d-a1dd-65cd846a6646-calico-apiserver-certs podName:39370675-f91f-489d-a1dd-65cd846a6646 nodeName:}" failed. No retries permitted until 2024-07-02 01:52:28.965496709 +0000 UTC m=+64.242065368 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/39370675-f91f-489d-a1dd-65cd846a6646-calico-apiserver-certs") pod "calico-apiserver-7b884df94f-ls8db" (UID: "39370675-f91f-489d-a1dd-65cd846a6646") : secret "calico-apiserver-certs" not found Jul 2 01:52:28.198644 env[1471]: time="2024-07-02T01:52:28.198600976Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b884df94f-vtld7,Uid:78d2739d-724c-4f72-aa96-cf00e30e55e5,Namespace:calico-apiserver,Attempt:0,}" Jul 2 01:52:28.339152 systemd-networkd[1624]: califa360e56d5f: Link UP Jul 2 01:52:28.352700 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 01:52:28.352812 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califa360e56d5f: link becomes ready Jul 2 01:52:28.354446 systemd-networkd[1624]: califa360e56d5f: Gained carrier Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.263 [INFO][5050] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--vtld7-eth0 calico-apiserver-7b884df94f- calico-apiserver 78d2739d-724c-4f72-aa96-cf00e30e55e5 922 0 2024-07-02 01:52:27 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7b884df94f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.5-a-118aa0dcdb calico-apiserver-7b884df94f-vtld7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] califa360e56d5f [] []}} ContainerID="ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" Namespace="calico-apiserver" Pod="calico-apiserver-7b884df94f-vtld7" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--vtld7-" Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.264 [INFO][5050] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" Namespace="calico-apiserver" Pod="calico-apiserver-7b884df94f-vtld7" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--vtld7-eth0" Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.293 [INFO][5061] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" HandleID="k8s-pod-network.ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--vtld7-eth0" Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.303 [INFO][5061] ipam_plugin.go 264: Auto assigning IP ContainerID="ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" HandleID="k8s-pod-network.ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--vtld7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000318790), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.5-a-118aa0dcdb", "pod":"calico-apiserver-7b884df94f-vtld7", "timestamp":"2024-07-02 01:52:28.293695362 +0000 UTC"}, Hostname:"ci-3510.3.5-a-118aa0dcdb", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.303 [INFO][5061] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.303 [INFO][5061] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.303 [INFO][5061] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-118aa0dcdb' Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.305 [INFO][5061] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.308 [INFO][5061] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.311 [INFO][5061] ipam.go 489: Trying affinity for 192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.312 [INFO][5061] ipam.go 155: Attempting to load block cidr=192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.314 [INFO][5061] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.314 [INFO][5061] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.6.64/26 handle="k8s-pod-network.ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.316 [INFO][5061] ipam.go 1685: Creating new handle: k8s-pod-network.ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6 Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.319 [INFO][5061] ipam.go 1203: Writing block in order to claim IPs block=192.168.6.64/26 handle="k8s-pod-network.ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.327 [INFO][5061] ipam.go 1216: Successfully claimed IPs: [192.168.6.69/26] block=192.168.6.64/26 handle="k8s-pod-network.ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.327 [INFO][5061] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.6.69/26] handle="k8s-pod-network.ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.327 [INFO][5061] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:28.367446 env[1471]: 2024-07-02 01:52:28.327 [INFO][5061] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.6.69/26] IPv6=[] ContainerID="ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" HandleID="k8s-pod-network.ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--vtld7-eth0" Jul 2 01:52:28.368014 env[1471]: 2024-07-02 01:52:28.329 [INFO][5050] k8s.go 386: Populated endpoint ContainerID="ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" Namespace="calico-apiserver" Pod="calico-apiserver-7b884df94f-vtld7" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--vtld7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--vtld7-eth0", GenerateName:"calico-apiserver-7b884df94f-", Namespace:"calico-apiserver", SelfLink:"", UID:"78d2739d-724c-4f72-aa96-cf00e30e55e5", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 52, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b884df94f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"", Pod:"calico-apiserver-7b884df94f-vtld7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.6.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califa360e56d5f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:28.368014 env[1471]: 2024-07-02 01:52:28.329 [INFO][5050] k8s.go 387: Calico CNI using IPs: [192.168.6.69/32] ContainerID="ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" Namespace="calico-apiserver" Pod="calico-apiserver-7b884df94f-vtld7" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--vtld7-eth0" Jul 2 01:52:28.368014 env[1471]: 2024-07-02 01:52:28.329 [INFO][5050] dataplane_linux.go 68: Setting the host side veth name to califa360e56d5f ContainerID="ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" Namespace="calico-apiserver" Pod="calico-apiserver-7b884df94f-vtld7" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--vtld7-eth0" Jul 2 01:52:28.368014 env[1471]: 2024-07-02 01:52:28.354 [INFO][5050] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" Namespace="calico-apiserver" Pod="calico-apiserver-7b884df94f-vtld7" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--vtld7-eth0" Jul 2 01:52:28.368014 env[1471]: 2024-07-02 01:52:28.354 [INFO][5050] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" Namespace="calico-apiserver" Pod="calico-apiserver-7b884df94f-vtld7" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--vtld7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--vtld7-eth0", GenerateName:"calico-apiserver-7b884df94f-", Namespace:"calico-apiserver", SelfLink:"", UID:"78d2739d-724c-4f72-aa96-cf00e30e55e5", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 52, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b884df94f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6", Pod:"calico-apiserver-7b884df94f-vtld7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.6.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califa360e56d5f", MAC:"72:52:72:90:1c:59", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:28.368014 env[1471]: 2024-07-02 01:52:28.366 [INFO][5050] k8s.go 500: Wrote updated endpoint to datastore ContainerID="ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6" Namespace="calico-apiserver" Pod="calico-apiserver-7b884df94f-vtld7" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--vtld7-eth0" Jul 2 01:52:28.377000 audit[5082]: NETFILTER_CFG table=filter:124 family=2 entries=55 op=nft_register_chain pid=5082 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:52:28.377000 audit[5082]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=27464 a0=3 a1=fffffa595390 a2=0 a3=ffff8390efa8 items=0 ppid=4080 pid=5082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:28.377000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:28.385856 env[1471]: time="2024-07-02T01:52:28.385791771Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:52:28.385981 env[1471]: time="2024-07-02T01:52:28.385829493Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:52:28.385981 env[1471]: time="2024-07-02T01:52:28.385839294Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:52:28.386166 env[1471]: time="2024-07-02T01:52:28.386115866Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6 pid=5090 runtime=io.containerd.runc.v2 Jul 2 01:52:28.397278 systemd[1]: Started cri-containerd-ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6.scope. Jul 2 01:52:28.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.410000 audit: BPF prog-id=190 op=LOAD Jul 2 01:52:28.411000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.411000 audit[5100]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=5090 pid=5100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:28.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561333536633763366262646638336533636662323637313366306337 Jul 2 01:52:28.412000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.412000 audit[5100]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=5090 pid=5100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:28.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561333536633763366262646638336533636662323637313366306337 Jul 2 01:52:28.412000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.412000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.412000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.412000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.412000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.412000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.412000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.412000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.412000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.412000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.412000 audit: BPF prog-id=191 op=LOAD Jul 2 01:52:28.412000 audit[5100]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=5090 pid=5100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:28.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561333536633763366262646638336533636662323637313366306337 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit: BPF prog-id=192 op=LOAD Jul 2 01:52:28.413000 audit[5100]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=5090 pid=5100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:28.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561333536633763366262646638336533636662323637313366306337 Jul 2 01:52:28.413000 audit: BPF prog-id=192 op=UNLOAD Jul 2 01:52:28.413000 audit: BPF prog-id=191 op=UNLOAD Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:28.413000 audit: BPF prog-id=193 op=LOAD Jul 2 01:52:28.413000 audit[5100]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=5090 pid=5100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:28.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561333536633763366262646638336533636662323637313366306337 Jul 2 01:52:28.436402 env[1471]: time="2024-07-02T01:52:28.436357962Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b884df94f-vtld7,Uid:78d2739d-724c-4f72-aa96-cf00e30e55e5,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6\"" Jul 2 01:52:28.438399 env[1471]: time="2024-07-02T01:52:28.438375775Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 01:52:29.023639 env[1471]: time="2024-07-02T01:52:29.023598954Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b884df94f-ls8db,Uid:39370675-f91f-489d-a1dd-65cd846a6646,Namespace:calico-apiserver,Attempt:0,}" Jul 2 01:52:29.162762 systemd-networkd[1624]: calidf38f5421cf: Link UP Jul 2 01:52:29.171678 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidf38f5421cf: link becomes ready Jul 2 01:52:29.171359 systemd-networkd[1624]: calidf38f5421cf: Gained carrier Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.093 [INFO][5127] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--ls8db-eth0 calico-apiserver-7b884df94f- calico-apiserver 39370675-f91f-489d-a1dd-65cd846a6646 913 0 2024-07-02 01:52:27 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7b884df94f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.5-a-118aa0dcdb calico-apiserver-7b884df94f-ls8db eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calidf38f5421cf [] []}} ContainerID="c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" Namespace="calico-apiserver" Pod="calico-apiserver-7b884df94f-ls8db" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--ls8db-" Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.093 [INFO][5127] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" Namespace="calico-apiserver" Pod="calico-apiserver-7b884df94f-ls8db" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--ls8db-eth0" Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.118 [INFO][5135] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" HandleID="k8s-pod-network.c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--ls8db-eth0" Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.133 [INFO][5135] ipam_plugin.go 264: Auto assigning IP ContainerID="c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" HandleID="k8s-pod-network.c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--ls8db-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000263de0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.5-a-118aa0dcdb", "pod":"calico-apiserver-7b884df94f-ls8db", "timestamp":"2024-07-02 01:52:29.118833433 +0000 UTC"}, Hostname:"ci-3510.3.5-a-118aa0dcdb", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.133 [INFO][5135] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.133 [INFO][5135] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.133 [INFO][5135] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-118aa0dcdb' Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.136 [INFO][5135] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.140 [INFO][5135] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.143 [INFO][5135] ipam.go 489: Trying affinity for 192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.144 [INFO][5135] ipam.go 155: Attempting to load block cidr=192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.146 [INFO][5135] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.6.64/26 host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.147 [INFO][5135] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.6.64/26 handle="k8s-pod-network.c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.149 [INFO][5135] ipam.go 1685: Creating new handle: k8s-pod-network.c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.152 [INFO][5135] ipam.go 1203: Writing block in order to claim IPs block=192.168.6.64/26 handle="k8s-pod-network.c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.157 [INFO][5135] ipam.go 1216: Successfully claimed IPs: [192.168.6.70/26] block=192.168.6.64/26 handle="k8s-pod-network.c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.157 [INFO][5135] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.6.70/26] handle="k8s-pod-network.c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" host="ci-3510.3.5-a-118aa0dcdb" Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.157 [INFO][5135] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 01:52:29.180839 env[1471]: 2024-07-02 01:52:29.157 [INFO][5135] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.6.70/26] IPv6=[] ContainerID="c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" HandleID="k8s-pod-network.c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" Workload="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--ls8db-eth0" Jul 2 01:52:29.181396 env[1471]: 2024-07-02 01:52:29.159 [INFO][5127] k8s.go 386: Populated endpoint ContainerID="c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" Namespace="calico-apiserver" Pod="calico-apiserver-7b884df94f-ls8db" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--ls8db-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--ls8db-eth0", GenerateName:"calico-apiserver-7b884df94f-", Namespace:"calico-apiserver", SelfLink:"", UID:"39370675-f91f-489d-a1dd-65cd846a6646", ResourceVersion:"913", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 52, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b884df94f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"", Pod:"calico-apiserver-7b884df94f-ls8db", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.6.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidf38f5421cf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:29.181396 env[1471]: 2024-07-02 01:52:29.159 [INFO][5127] k8s.go 387: Calico CNI using IPs: [192.168.6.70/32] ContainerID="c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" Namespace="calico-apiserver" Pod="calico-apiserver-7b884df94f-ls8db" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--ls8db-eth0" Jul 2 01:52:29.181396 env[1471]: 2024-07-02 01:52:29.159 [INFO][5127] dataplane_linux.go 68: Setting the host side veth name to calidf38f5421cf ContainerID="c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" Namespace="calico-apiserver" Pod="calico-apiserver-7b884df94f-ls8db" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--ls8db-eth0" Jul 2 01:52:29.181396 env[1471]: 2024-07-02 01:52:29.172 [INFO][5127] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" Namespace="calico-apiserver" Pod="calico-apiserver-7b884df94f-ls8db" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--ls8db-eth0" Jul 2 01:52:29.181396 env[1471]: 2024-07-02 01:52:29.173 [INFO][5127] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" Namespace="calico-apiserver" Pod="calico-apiserver-7b884df94f-ls8db" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--ls8db-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--ls8db-eth0", GenerateName:"calico-apiserver-7b884df94f-", Namespace:"calico-apiserver", SelfLink:"", UID:"39370675-f91f-489d-a1dd-65cd846a6646", ResourceVersion:"913", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 1, 52, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b884df94f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-118aa0dcdb", ContainerID:"c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc", Pod:"calico-apiserver-7b884df94f-ls8db", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.6.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidf38f5421cf", MAC:"d6:34:33:35:36:00", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 01:52:29.181396 env[1471]: 2024-07-02 01:52:29.179 [INFO][5127] k8s.go 500: Wrote updated endpoint to datastore ContainerID="c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc" Namespace="calico-apiserver" Pod="calico-apiserver-7b884df94f-ls8db" WorkloadEndpoint="ci--3510.3.5--a--118aa0dcdb-k8s-calico--apiserver--7b884df94f--ls8db-eth0" Jul 2 01:52:29.200816 env[1471]: time="2024-07-02T01:52:29.200733627Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:52:29.201212 env[1471]: time="2024-07-02T01:52:29.201169447Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:52:29.201326 env[1471]: time="2024-07-02T01:52:29.201300973Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:52:29.201662 env[1471]: time="2024-07-02T01:52:29.201623108Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc pid=5163 runtime=io.containerd.runc.v2 Jul 2 01:52:29.216486 systemd[1]: Started cri-containerd-c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc.scope. Jul 2 01:52:29.227000 audit[5168]: NETFILTER_CFG table=filter:125 family=2 entries=49 op=nft_register_chain pid=5168 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 01:52:29.227000 audit[5168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24300 a0=3 a1=ffffcb032370 a2=0 a3=ffff8cb22fa8 items=0 ppid=4080 pid=5168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:29.227000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 01:52:29.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.239000 audit: BPF prog-id=194 op=LOAD Jul 2 01:52:29.240000 audit[5174]: AVC avc: denied { bpf } for pid=5174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.240000 audit[5174]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5163 pid=5174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:29.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339303461343062376135633163396437313133326532346566646433 Jul 2 01:52:29.240000 audit[5174]: AVC avc: denied { perfmon } for pid=5174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.240000 audit[5174]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5163 pid=5174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:29.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339303461343062376135633163396437313133326532346566646433 Jul 2 01:52:29.240000 audit[5174]: AVC avc: denied { bpf } for pid=5174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.240000 audit[5174]: AVC avc: denied { bpf } for pid=5174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.240000 audit[5174]: AVC avc: denied { bpf } for pid=5174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.240000 audit[5174]: AVC avc: denied { perfmon } for pid=5174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.240000 audit[5174]: AVC avc: denied { perfmon } for pid=5174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.240000 audit[5174]: AVC avc: denied { perfmon } for pid=5174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.240000 audit[5174]: AVC avc: denied { perfmon } for pid=5174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.240000 audit[5174]: AVC avc: denied { perfmon } for pid=5174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.240000 audit[5174]: AVC avc: denied { bpf } for pid=5174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.240000 audit[5174]: AVC avc: denied { bpf } for pid=5174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.240000 audit: BPF prog-id=195 op=LOAD Jul 2 01:52:29.240000 audit[5174]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5163 pid=5174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:29.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339303461343062376135633163396437313133326532346566646433 Jul 2 01:52:29.241000 audit[5174]: AVC avc: denied { bpf } for pid=5174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.241000 audit[5174]: AVC avc: denied { bpf } for pid=5174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.241000 audit[5174]: AVC avc: denied { perfmon } for pid=5174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.241000 audit[5174]: AVC avc: denied { perfmon } for pid=5174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.241000 audit[5174]: AVC avc: denied { perfmon } for pid=5174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.241000 audit[5174]: AVC avc: denied { perfmon } for pid=5174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.241000 audit[5174]: AVC avc: denied { perfmon } for pid=5174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.241000 audit[5174]: AVC avc: denied { bpf } for pid=5174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.241000 audit[5174]: AVC avc: denied { bpf } for pid=5174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.241000 audit: BPF prog-id=196 op=LOAD Jul 2 01:52:29.241000 audit[5174]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5163 pid=5174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:29.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339303461343062376135633163396437313133326532346566646433 Jul 2 01:52:29.241000 audit: BPF prog-id=196 op=UNLOAD Jul 2 01:52:29.241000 audit: BPF prog-id=195 op=UNLOAD Jul 2 01:52:29.242000 audit[5174]: AVC avc: denied { bpf } for pid=5174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.242000 audit[5174]: AVC avc: denied { bpf } for pid=5174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.242000 audit[5174]: AVC avc: denied { bpf } for pid=5174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.242000 audit[5174]: AVC avc: denied { perfmon } for pid=5174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.242000 audit[5174]: AVC avc: denied { perfmon } for pid=5174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.242000 audit[5174]: AVC avc: denied { perfmon } for pid=5174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.242000 audit[5174]: AVC avc: denied { perfmon } for pid=5174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.242000 audit[5174]: AVC avc: denied { perfmon } for pid=5174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.242000 audit[5174]: AVC avc: denied { bpf } for pid=5174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.242000 audit[5174]: AVC avc: denied { bpf } for pid=5174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:29.242000 audit: BPF prog-id=197 op=LOAD Jul 2 01:52:29.242000 audit[5174]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5163 pid=5174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:29.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339303461343062376135633163396437313133326532346566646433 Jul 2 01:52:29.263053 env[1471]: time="2024-07-02T01:52:29.263014892Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b884df94f-ls8db,Uid:39370675-f91f-489d-a1dd-65cd846a6646,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc\"" Jul 2 01:52:29.886635 systemd-networkd[1624]: califa360e56d5f: Gained IPv6LL Jul 2 01:52:30.450713 env[1471]: time="2024-07-02T01:52:30.450657805Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:30.458212 env[1471]: time="2024-07-02T01:52:30.458177983Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cfbcd2d846bffa8495396cef27ce876ed8ebd8e36f660b8dd9326c1ff4d770ac,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:30.462919 env[1471]: time="2024-07-02T01:52:30.462887595Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:30.467203 env[1471]: time="2024-07-02T01:52:30.467160747Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:30.467652 env[1471]: time="2024-07-02T01:52:30.467621888Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:cfbcd2d846bffa8495396cef27ce876ed8ebd8e36f660b8dd9326c1ff4d770ac\"" Jul 2 01:52:30.471866 env[1471]: time="2024-07-02T01:52:30.471835918Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 01:52:30.472938 env[1471]: time="2024-07-02T01:52:30.472901166Z" level=info msg="CreateContainer within sandbox \"ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 01:52:30.502098 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3024340709.mount: Deactivated successfully. Jul 2 01:52:30.520391 env[1471]: time="2024-07-02T01:52:30.520338901Z" level=info msg="CreateContainer within sandbox \"ea356c7c6bbdf83e3cfb26713f0c7d856455f348f75c0eeb9743d5871115edf6\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"39d5240d8592dc35ef41903821014e89dc61ce9385ea8c947dd4ce6a8c74088f\"" Jul 2 01:52:30.524094 env[1471]: time="2024-07-02T01:52:30.523841699Z" level=info msg="StartContainer for \"39d5240d8592dc35ef41903821014e89dc61ce9385ea8c947dd4ce6a8c74088f\"" Jul 2 01:52:30.556775 systemd[1]: Started cri-containerd-39d5240d8592dc35ef41903821014e89dc61ce9385ea8c947dd4ce6a8c74088f.scope. Jul 2 01:52:30.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.567000 audit: BPF prog-id=198 op=LOAD Jul 2 01:52:30.568000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.568000 audit[5205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=5090 pid=5205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:30.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339643532343064383539326463333565663431393033383231303134 Jul 2 01:52:30.568000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.568000 audit[5205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=5090 pid=5205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:30.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339643532343064383539326463333565663431393033383231303134 Jul 2 01:52:30.568000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.568000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.568000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.568000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.568000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.568000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.568000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.568000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.568000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.568000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.568000 audit: BPF prog-id=199 op=LOAD Jul 2 01:52:30.568000 audit[5205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=5090 pid=5205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:30.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339643532343064383539326463333565663431393033383231303134 Jul 2 01:52:30.569000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.569000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.569000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.569000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.569000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.569000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.569000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.569000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.569000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.569000 audit: BPF prog-id=200 op=LOAD Jul 2 01:52:30.569000 audit[5205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=5090 pid=5205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:30.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339643532343064383539326463333565663431393033383231303134 Jul 2 01:52:30.569000 audit: BPF prog-id=200 op=UNLOAD Jul 2 01:52:30.570000 audit: BPF prog-id=199 op=UNLOAD Jul 2 01:52:30.570000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.570000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.570000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.570000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.570000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.570000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.570000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.570000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.570000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.570000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.570000 audit: BPF prog-id=201 op=LOAD Jul 2 01:52:30.570000 audit[5205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=5090 pid=5205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:30.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339643532343064383539326463333565663431393033383231303134 Jul 2 01:52:30.600681 env[1471]: time="2024-07-02T01:52:30.600625795Z" level=info msg="StartContainer for \"39d5240d8592dc35ef41903821014e89dc61ce9385ea8c947dd4ce6a8c74088f\" returns successfully" Jul 2 01:52:30.717590 systemd-networkd[1624]: calidf38f5421cf: Gained IPv6LL Jul 2 01:52:30.778959 env[1471]: time="2024-07-02T01:52:30.778918861Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:30.787877 env[1471]: time="2024-07-02T01:52:30.787840663Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:cfbcd2d846bffa8495396cef27ce876ed8ebd8e36f660b8dd9326c1ff4d770ac,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:30.792937 env[1471]: time="2024-07-02T01:52:30.792897251Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:30.798172 env[1471]: time="2024-07-02T01:52:30.798132086Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 01:52:30.798702 env[1471]: time="2024-07-02T01:52:30.798674991Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:cfbcd2d846bffa8495396cef27ce876ed8ebd8e36f660b8dd9326c1ff4d770ac\"" Jul 2 01:52:30.801330 env[1471]: time="2024-07-02T01:52:30.801296229Z" level=info msg="CreateContainer within sandbox \"c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 01:52:30.833961 env[1471]: time="2024-07-02T01:52:30.833910857Z" level=info msg="CreateContainer within sandbox \"c904a40b7a5c1c9d71132e24efdd3f7e8362bce0187253aa4e098de41279b8bc\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"b0289fb6c5dab988110010d3024f6b625bd89fa3b48244bee6df36919ac4eac8\"" Jul 2 01:52:30.834829 env[1471]: time="2024-07-02T01:52:30.834796577Z" level=info msg="StartContainer for \"b0289fb6c5dab988110010d3024f6b625bd89fa3b48244bee6df36919ac4eac8\"" Jul 2 01:52:30.853236 systemd[1]: Started cri-containerd-b0289fb6c5dab988110010d3024f6b625bd89fa3b48244bee6df36919ac4eac8.scope. Jul 2 01:52:30.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.876000 audit: BPF prog-id=202 op=LOAD Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=5163 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:30.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230323839666236633564616239383831313030313064333032346636 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=5163 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:30.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230323839666236633564616239383831313030313064333032346636 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit: BPF prog-id=203 op=LOAD Jul 2 01:52:30.877000 audit[5243]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=5163 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:30.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230323839666236633564616239383831313030313064333032346636 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit: BPF prog-id=204 op=LOAD Jul 2 01:52:30.877000 audit[5243]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=19 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=5163 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:30.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230323839666236633564616239383831313030313064333032346636 Jul 2 01:52:30.877000 audit: BPF prog-id=204 op=UNLOAD Jul 2 01:52:30.877000 audit: BPF prog-id=203 op=UNLOAD Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:52:30.877000 audit: BPF prog-id=205 op=LOAD Jul 2 01:52:30.877000 audit[5243]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=5163 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:30.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230323839666236633564616239383831313030313064333032346636 Jul 2 01:52:31.021263 env[1471]: time="2024-07-02T01:52:31.021171720Z" level=info msg="StartContainer for \"b0289fb6c5dab988110010d3024f6b625bd89fa3b48244bee6df36919ac4eac8\" returns successfully" Jul 2 01:52:31.123444 kubelet[2592]: I0702 01:52:31.123366 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7b884df94f-ls8db" podStartSLOduration=2.588266414 podStartE2EDuration="4.123347526s" podCreationTimestamp="2024-07-02 01:52:27 +0000 UTC" firstStartedPulling="2024-07-02 01:52:29.26451848 +0000 UTC m=+64.541087139" lastFinishedPulling="2024-07-02 01:52:30.799599552 +0000 UTC m=+66.076168251" observedRunningTime="2024-07-02 01:52:31.1227521 +0000 UTC m=+66.399320799" watchObservedRunningTime="2024-07-02 01:52:31.123347526 +0000 UTC m=+66.399916225" Jul 2 01:52:31.123915 kubelet[2592]: I0702 01:52:31.123486 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7b884df94f-vtld7" podStartSLOduration=2.092462139 podStartE2EDuration="4.123481292s" podCreationTimestamp="2024-07-02 01:52:27 +0000 UTC" firstStartedPulling="2024-07-02 01:52:28.437937755 +0000 UTC m=+63.714506454" lastFinishedPulling="2024-07-02 01:52:30.468956868 +0000 UTC m=+65.745525607" observedRunningTime="2024-07-02 01:52:31.108529424 +0000 UTC m=+66.385098123" watchObservedRunningTime="2024-07-02 01:52:31.123481292 +0000 UTC m=+66.400049991" Jul 2 01:52:31.150000 audit[5276]: NETFILTER_CFG table=filter:126 family=2 entries=10 op=nft_register_rule pid=5276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:31.150000 audit[5276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe013c7a0 a2=0 a3=1 items=0 ppid=2729 pid=5276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:31.150000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:31.153000 audit[5276]: NETFILTER_CFG table=nat:127 family=2 entries=20 op=nft_register_rule pid=5276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:31.153000 audit[5276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe013c7a0 a2=0 a3=1 items=0 ppid=2729 pid=5276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:31.153000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:31.181000 audit[5278]: NETFILTER_CFG table=filter:128 family=2 entries=10 op=nft_register_rule pid=5278 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:31.181000 audit[5278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffebc529a0 a2=0 a3=1 items=0 ppid=2729 pid=5278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:31.181000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:31.182000 audit[5278]: NETFILTER_CFG table=nat:129 family=2 entries=20 op=nft_register_rule pid=5278 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:31.182000 audit[5278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffebc529a0 a2=0 a3=1 items=0 ppid=2729 pid=5278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:31.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:31.498549 systemd[1]: run-containerd-runc-k8s.io-39d5240d8592dc35ef41903821014e89dc61ce9385ea8c947dd4ce6a8c74088f-runc.IoiAvM.mount: Deactivated successfully. Jul 2 01:52:31.605000 audit[5217]: AVC avc: denied { watch } for pid=5217 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_28.3368817371/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c629,c976 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c629,c976 tclass=file permissive=0 Jul 2 01:52:31.605000 audit[5217]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a4a3a0 a2=fc6 a3=0 items=0 ppid=5090 pid=5217 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c629,c976 key=(null) Jul 2 01:52:31.605000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:52:32.146000 audit[5281]: NETFILTER_CFG table=filter:130 family=2 entries=9 op=nft_register_rule pid=5281 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:32.146000 audit[5281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe44d9550 a2=0 a3=1 items=0 ppid=2729 pid=5281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:32.146000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:32.150000 audit[5254]: AVC avc: denied { watch } for pid=5254 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_28.1315374761/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c748 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c95,c748 tclass=file permissive=0 Jul 2 01:52:32.150000 audit[5254]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a64fa0 a2=fc6 a3=0 items=0 ppid=5163 pid=5254 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c748 key=(null) Jul 2 01:52:32.150000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:52:32.148000 audit[5281]: NETFILTER_CFG table=nat:131 family=2 entries=27 op=nft_register_chain pid=5281 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:32.148000 audit[5281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffe44d9550 a2=0 a3=1 items=0 ppid=2729 pid=5281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:32.148000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:33.158000 audit[5283]: NETFILTER_CFG table=filter:132 family=2 entries=8 op=nft_register_rule pid=5283 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:33.164021 kernel: kauditd_printk_skb: 260 callbacks suppressed Jul 2 01:52:33.164133 kernel: audit: type=1325 audit(1719885153.158:1336): table=filter:132 family=2 entries=8 op=nft_register_rule pid=5283 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:33.158000 audit[5283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff4870850 a2=0 a3=1 items=0 ppid=2729 pid=5283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:33.208950 kernel: audit: type=1300 audit(1719885153.158:1336): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff4870850 a2=0 a3=1 items=0 ppid=2729 pid=5283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:33.158000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:33.221199 kernel: audit: type=1327 audit(1719885153.158:1336): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:33.182000 audit[5283]: NETFILTER_CFG table=nat:133 family=2 entries=34 op=nft_register_chain pid=5283 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:33.238595 kernel: audit: type=1325 audit(1719885153.182:1337): table=nat:133 family=2 entries=34 op=nft_register_chain pid=5283 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:52:33.238740 kernel: audit: type=1300 audit(1719885153.182:1337): arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff4870850 a2=0 a3=1 items=0 ppid=2729 pid=5283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:33.182000 audit[5283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff4870850 a2=0 a3=1 items=0 ppid=2729 pid=5283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:52:33.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:33.275070 kernel: audit: type=1327 audit(1719885153.182:1337): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:52:33.303341 systemd[1]: run-containerd-runc-k8s.io-a89b44eb3a285f58cd79831b28528b64b7cf78c02a7c1423c2a558436f1b0182-runc.u5c3Vk.mount: Deactivated successfully. Jul 2 01:52:37.624000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:37.624000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001147c60 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:52:37.674371 kernel: audit: type=1400 audit(1719885157.624:1338): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:37.674522 kernel: audit: type=1300 audit(1719885157.624:1338): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001147c60 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:52:37.624000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:52:37.697187 kernel: audit: type=1327 audit(1719885157.624:1338): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:52:37.625000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:37.718910 kernel: audit: type=1400 audit(1719885157.625:1339): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:37.625000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001147f20 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:52:37.625000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:52:37.625000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:37.625000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a748c0 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:52:37.625000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:52:37.628000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:52:37.628000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a98180 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:52:37.628000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:52:40.592857 systemd[1]: run-containerd-runc-k8s.io-a89b44eb3a285f58cd79831b28528b64b7cf78c02a7c1423c2a558436f1b0182-runc.2E0bc2.mount: Deactivated successfully. Jul 2 01:52:55.314199 systemd[1]: run-containerd-runc-k8s.io-fe5f4b011fb321da004a2f0932688887bc1f262fc8bb40b5694f79900be66653-runc.x5G3iS.mount: Deactivated successfully. Jul 2 01:53:03.303429 systemd[1]: run-containerd-runc-k8s.io-a89b44eb3a285f58cd79831b28528b64b7cf78c02a7c1423c2a558436f1b0182-runc.FIG4cu.mount: Deactivated successfully. Jul 2 01:53:21.697000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:21.703135 kernel: kauditd_printk_skb: 8 callbacks suppressed Jul 2 01:53:21.703249 kernel: audit: type=1400 audit(1719885201.697:1342): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:21.697000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001909320 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:53:21.749787 kernel: audit: type=1300 audit(1719885201.697:1342): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001909320 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:53:21.749902 kernel: audit: type=1327 audit(1719885201.697:1342): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:21.697000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:21.699000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:21.793116 kernel: audit: type=1400 audit(1719885201.699:1343): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:21.793233 kernel: audit: type=1300 audit(1719885201.699:1343): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027c0240 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:53:21.699000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027c0240 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:53:21.699000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:21.842409 kernel: audit: type=1327 audit(1719885201.699:1343): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:22.143000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521029 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:22.143000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:22.186083 kernel: audit: type=1400 audit(1719885202.143:1344): avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521029 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:22.186215 kernel: audit: type=1400 audit(1719885202.143:1345): avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:22.186252 kernel: audit: type=1300 audit(1719885202.143:1345): arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4003305950 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:53:22.143000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4003305950 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:53:22.143000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:53:22.234565 kernel: audit: type=1327 audit(1719885202.143:1345): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:53:22.143000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4006767b60 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:53:22.143000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:53:22.149000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:22.149000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4006767b90 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:53:22.149000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:53:22.151000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:22.151000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4005c4f840 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:53:22.151000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:53:22.286000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:22.286000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4006767dd0 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:53:22.286000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:53:22.286000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:22.286000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=40098171e0 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:53:22.286000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:53:31.607000 audit[5217]: AVC avc: denied { watch } for pid=5217 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_28.3368817371/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c629,c976 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c629,c976 tclass=file permissive=0 Jul 2 01:53:31.613353 kernel: kauditd_printk_skb: 14 callbacks suppressed Jul 2 01:53:31.613507 kernel: audit: type=1400 audit(1719885211.607:1350): avc: denied { watch } for pid=5217 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_28.3368817371/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c629,c976 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c629,c976 tclass=file permissive=0 Jul 2 01:53:31.607000 audit[5217]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000b408a0 a2=fc6 a3=0 items=0 ppid=5090 pid=5217 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c629,c976 key=(null) Jul 2 01:53:31.607000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:53:31.686565 kernel: audit: type=1300 audit(1719885211.607:1350): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000b408a0 a2=fc6 a3=0 items=0 ppid=5090 pid=5217 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c629,c976 key=(null) Jul 2 01:53:31.686752 kernel: audit: type=1327 audit(1719885211.607:1350): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:53:32.151000 audit[5254]: AVC avc: denied { watch } for pid=5254 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_28.1315374761/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c748 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c95,c748 tclass=file permissive=0 Jul 2 01:53:32.151000 audit[5254]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40005a5940 a2=fc6 a3=0 items=0 ppid=5163 pid=5254 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c748 key=(null) Jul 2 01:53:32.203266 kernel: audit: type=1400 audit(1719885212.151:1351): avc: denied { watch } for pid=5254 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_28.1315374761/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c748 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c95,c748 tclass=file permissive=0 Jul 2 01:53:32.203399 kernel: audit: type=1300 audit(1719885212.151:1351): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40005a5940 a2=fc6 a3=0 items=0 ppid=5163 pid=5254 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c748 key=(null) Jul 2 01:53:32.203435 kernel: audit: type=1327 audit(1719885212.151:1351): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:53:32.151000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:53:37.626000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:37.626000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:37.667705 kernel: audit: type=1400 audit(1719885217.626:1352): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:37.667825 kernel: audit: type=1400 audit(1719885217.626:1353): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:37.667855 kernel: audit: type=1300 audit(1719885217.626:1353): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001dd6a80 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:53:37.626000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001dd6a80 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:53:37.626000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:37.718307 kernel: audit: type=1327 audit(1719885217.626:1353): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:37.626000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:37.739277 kernel: audit: type=1400 audit(1719885217.626:1354): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:37.626000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001dd6c20 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:53:37.626000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:37.790342 kernel: audit: type=1300 audit(1719885217.626:1354): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001dd6c20 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:53:37.790447 kernel: audit: type=1327 audit(1719885217.626:1354): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:37.626000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001ba9a60 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:53:37.818272 kernel: audit: type=1300 audit(1719885217.626:1352): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001ba9a60 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:53:37.626000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:37.629000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:37.861169 kernel: audit: type=1327 audit(1719885217.626:1352): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:37.861251 kernel: audit: type=1400 audit(1719885217.629:1355): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:53:37.629000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001dd6f40 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:53:37.629000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:53:54.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.43:22-10.200.16.10:34712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:54.578316 systemd[1]: Started sshd@7-10.200.20.43:22-10.200.16.10:34712.service. Jul 2 01:53:54.583587 kernel: kauditd_printk_skb: 2 callbacks suppressed Jul 2 01:53:54.583639 kernel: audit: type=1130 audit(1719885234.578:1356): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.43:22-10.200.16.10:34712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:53:55.072000 audit[5528]: USER_ACCT pid=5528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:55.073494 sshd[5528]: Accepted publickey for core from 10.200.16.10 port 34712 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:53:55.075602 sshd[5528]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:53:55.074000 audit[5528]: CRED_ACQ pid=5528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:55.115772 kernel: audit: type=1101 audit(1719885235.072:1357): pid=5528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:55.115893 kernel: audit: type=1103 audit(1719885235.074:1358): pid=5528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:55.123281 kernel: audit: type=1006 audit(1719885235.074:1359): pid=5528 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Jul 2 01:53:55.122821 systemd-logind[1455]: New session 10 of user core. Jul 2 01:53:55.123988 systemd[1]: Started session-10.scope. Jul 2 01:53:55.074000 audit[5528]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffec640ea0 a2=3 a3=1 items=0 ppid=1 pid=5528 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:55.151828 kernel: audit: type=1300 audit(1719885235.074:1359): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffec640ea0 a2=3 a3=1 items=0 ppid=1 pid=5528 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:53:55.074000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:53:55.159616 kernel: audit: type=1327 audit(1719885235.074:1359): proctitle=737368643A20636F7265205B707269765D Jul 2 01:53:55.128000 audit[5528]: USER_START pid=5528 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:55.183806 kernel: audit: type=1105 audit(1719885235.128:1360): pid=5528 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:55.130000 audit[5530]: CRED_ACQ pid=5530 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:55.203820 kernel: audit: type=1103 audit(1719885235.130:1361): pid=5530 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:55.318997 systemd[1]: run-containerd-runc-k8s.io-fe5f4b011fb321da004a2f0932688887bc1f262fc8bb40b5694f79900be66653-runc.BLH9tK.mount: Deactivated successfully. Jul 2 01:53:55.515658 sshd[5528]: pam_unix(sshd:session): session closed for user core Jul 2 01:53:55.516000 audit[5528]: USER_END pid=5528 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:55.518150 systemd-logind[1455]: Session 10 logged out. Waiting for processes to exit. Jul 2 01:53:55.519769 systemd[1]: sshd@7-10.200.20.43:22-10.200.16.10:34712.service: Deactivated successfully. Jul 2 01:53:55.520522 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 01:53:55.522212 systemd-logind[1455]: Removed session 10. Jul 2 01:53:55.516000 audit[5528]: CRED_DISP pid=5528 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:55.561465 kernel: audit: type=1106 audit(1719885235.516:1362): pid=5528 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:55.561563 kernel: audit: type=1104 audit(1719885235.516:1363): pid=5528 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:53:55.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.43:22-10.200.16.10:34712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:00.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.43:22-10.200.16.10:50798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:00.596108 systemd[1]: Started sshd@8-10.200.20.43:22-10.200.16.10:50798.service. Jul 2 01:54:00.601394 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:54:00.601511 kernel: audit: type=1130 audit(1719885240.594:1365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.43:22-10.200.16.10:50798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:01.086880 sshd[5566]: Accepted publickey for core from 10.200.16.10 port 50798 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:01.085000 audit[5566]: USER_ACCT pid=5566 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:01.109904 sshd[5566]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:01.108000 audit[5566]: CRED_ACQ pid=5566 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:01.130976 kernel: audit: type=1101 audit(1719885241.085:1366): pid=5566 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:01.131111 kernel: audit: type=1103 audit(1719885241.108:1367): pid=5566 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:01.144492 kernel: audit: type=1006 audit(1719885241.108:1368): pid=5566 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Jul 2 01:54:01.108000 audit[5566]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff42f9c80 a2=3 a3=1 items=0 ppid=1 pid=5566 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:01.167514 kernel: audit: type=1300 audit(1719885241.108:1368): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff42f9c80 a2=3 a3=1 items=0 ppid=1 pid=5566 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:01.167963 systemd-logind[1455]: New session 11 of user core. Jul 2 01:54:01.175701 kernel: audit: type=1327 audit(1719885241.108:1368): proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:01.108000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:01.168688 systemd[1]: Started session-11.scope. Jul 2 01:54:01.175000 audit[5566]: USER_START pid=5566 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:01.176000 audit[5568]: CRED_ACQ pid=5568 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:01.221374 kernel: audit: type=1105 audit(1719885241.175:1369): pid=5566 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:01.221472 kernel: audit: type=1103 audit(1719885241.176:1370): pid=5568 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:01.516000 audit[5566]: USER_END pid=5566 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:01.516748 sshd[5566]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:01.516000 audit[5566]: CRED_DISP pid=5566 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:01.543629 systemd[1]: sshd@8-10.200.20.43:22-10.200.16.10:50798.service: Deactivated successfully. Jul 2 01:54:01.544402 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 01:54:01.545808 systemd-logind[1455]: Session 11 logged out. Waiting for processes to exit. Jul 2 01:54:01.546704 systemd-logind[1455]: Removed session 11. Jul 2 01:54:01.562967 kernel: audit: type=1106 audit(1719885241.516:1371): pid=5566 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:01.563081 kernel: audit: type=1104 audit(1719885241.516:1372): pid=5566 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:01.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.43:22-10.200.16.10:50798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:03.300025 systemd[1]: run-containerd-runc-k8s.io-a89b44eb3a285f58cd79831b28528b64b7cf78c02a7c1423c2a558436f1b0182-runc.78ntSn.mount: Deactivated successfully. Jul 2 01:54:06.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.43:22-10.200.16.10:50814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:06.594499 systemd[1]: Started sshd@9-10.200.20.43:22-10.200.16.10:50814.service. Jul 2 01:54:06.601509 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:54:06.601617 kernel: audit: type=1130 audit(1719885246.593:1374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.43:22-10.200.16.10:50814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:07.062000 audit[5597]: USER_ACCT pid=5597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:07.064508 sshd[5597]: Accepted publickey for core from 10.200.16.10 port 50814 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:07.087482 kernel: audit: type=1101 audit(1719885247.062:1375): pid=5597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:07.088171 sshd[5597]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:07.086000 audit[5597]: CRED_ACQ pid=5597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:07.122635 kernel: audit: type=1103 audit(1719885247.086:1376): pid=5597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:07.122755 kernel: audit: type=1006 audit(1719885247.086:1377): pid=5597 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Jul 2 01:54:07.086000 audit[5597]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeda63360 a2=3 a3=1 items=0 ppid=1 pid=5597 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:07.126264 systemd[1]: Started session-12.scope. Jul 2 01:54:07.145982 kernel: audit: type=1300 audit(1719885247.086:1377): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeda63360 a2=3 a3=1 items=0 ppid=1 pid=5597 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:07.146343 systemd-logind[1455]: New session 12 of user core. Jul 2 01:54:07.086000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:07.154393 kernel: audit: type=1327 audit(1719885247.086:1377): proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:07.154510 kernel: audit: type=1105 audit(1719885247.149:1378): pid=5597 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:07.149000 audit[5597]: USER_START pid=5597 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:07.178686 kernel: audit: type=1103 audit(1719885247.151:1379): pid=5599 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:07.151000 audit[5599]: CRED_ACQ pid=5599 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:07.511862 sshd[5597]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:07.511000 audit[5597]: USER_END pid=5597 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:07.514985 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 01:54:07.515740 systemd[1]: sshd@9-10.200.20.43:22-10.200.16.10:50814.service: Deactivated successfully. Jul 2 01:54:07.512000 audit[5597]: CRED_DISP pid=5597 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:07.537745 systemd-logind[1455]: Session 12 logged out. Waiting for processes to exit. Jul 2 01:54:07.538483 kernel: audit: type=1106 audit(1719885247.511:1380): pid=5597 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:07.538551 kernel: audit: type=1104 audit(1719885247.512:1381): pid=5597 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:07.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.43:22-10.200.16.10:50814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:07.558678 systemd-logind[1455]: Removed session 12. Jul 2 01:54:12.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.43:22-10.200.16.10:47978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:12.586433 systemd[1]: Started sshd@10-10.200.20.43:22-10.200.16.10:47978.service. Jul 2 01:54:12.591525 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:54:12.591627 kernel: audit: type=1130 audit(1719885252.586:1383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.43:22-10.200.16.10:47978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:13.023000 audit[5616]: USER_ACCT pid=5616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:13.024311 sshd[5616]: Accepted publickey for core from 10.200.16.10 port 47978 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:13.026156 sshd[5616]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:13.025000 audit[5616]: CRED_ACQ pid=5616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:13.068812 kernel: audit: type=1101 audit(1719885253.023:1384): pid=5616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:13.068917 kernel: audit: type=1103 audit(1719885253.025:1385): pid=5616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:13.073996 systemd[1]: Started session-13.scope. Jul 2 01:54:13.075326 systemd-logind[1455]: New session 13 of user core. Jul 2 01:54:13.083986 kernel: audit: type=1006 audit(1719885253.025:1386): pid=5616 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Jul 2 01:54:13.025000 audit[5616]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc2beda90 a2=3 a3=1 items=0 ppid=1 pid=5616 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:13.106978 kernel: audit: type=1300 audit(1719885253.025:1386): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc2beda90 a2=3 a3=1 items=0 ppid=1 pid=5616 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:13.025000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:13.115244 kernel: audit: type=1327 audit(1719885253.025:1386): proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:13.115310 kernel: audit: type=1105 audit(1719885253.079:1387): pid=5616 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:13.079000 audit[5616]: USER_START pid=5616 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:13.080000 audit[5618]: CRED_ACQ pid=5618 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:13.159275 kernel: audit: type=1103 audit(1719885253.080:1388): pid=5618 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:13.422754 sshd[5616]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:13.423000 audit[5616]: USER_END pid=5616 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:13.428308 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 01:54:13.429212 systemd[1]: sshd@10-10.200.20.43:22-10.200.16.10:47978.service: Deactivated successfully. Jul 2 01:54:13.423000 audit[5616]: CRED_DISP pid=5616 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:13.448200 systemd-logind[1455]: Session 13 logged out. Waiting for processes to exit. Jul 2 01:54:13.467739 kernel: audit: type=1106 audit(1719885253.423:1389): pid=5616 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:13.467808 kernel: audit: type=1104 audit(1719885253.423:1390): pid=5616 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:13.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.43:22-10.200.16.10:47978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:13.468411 systemd-logind[1455]: Removed session 13. Jul 2 01:54:13.494358 systemd[1]: Started sshd@11-10.200.20.43:22-10.200.16.10:47980.service. Jul 2 01:54:13.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.43:22-10.200.16.10:47980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:13.926782 sshd[5629]: Accepted publickey for core from 10.200.16.10 port 47980 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:13.926000 audit[5629]: USER_ACCT pid=5629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:13.928712 sshd[5629]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:13.927000 audit[5629]: CRED_ACQ pid=5629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:13.927000 audit[5629]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4168780 a2=3 a3=1 items=0 ppid=1 pid=5629 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:13.927000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:13.933868 systemd[1]: Started session-14.scope. Jul 2 01:54:13.934226 systemd-logind[1455]: New session 14 of user core. Jul 2 01:54:13.938000 audit[5629]: USER_START pid=5629 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:13.939000 audit[5631]: CRED_ACQ pid=5631 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:14.344285 sshd[5629]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:14.344000 audit[5629]: USER_END pid=5629 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:14.345000 audit[5629]: CRED_DISP pid=5629 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:14.347104 systemd-logind[1455]: Session 14 logged out. Waiting for processes to exit. Jul 2 01:54:14.347894 systemd[1]: sshd@11-10.200.20.43:22-10.200.16.10:47980.service: Deactivated successfully. Jul 2 01:54:14.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.43:22-10.200.16.10:47980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:14.348980 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 01:54:14.349958 systemd-logind[1455]: Removed session 14. Jul 2 01:54:14.423261 systemd[1]: Started sshd@12-10.200.20.43:22-10.200.16.10:47996.service. Jul 2 01:54:14.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.43:22-10.200.16.10:47996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:14.889000 audit[5638]: USER_ACCT pid=5638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:14.889872 sshd[5638]: Accepted publickey for core from 10.200.16.10 port 47996 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:14.890000 audit[5638]: CRED_ACQ pid=5638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:14.890000 audit[5638]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9f43820 a2=3 a3=1 items=0 ppid=1 pid=5638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:14.890000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:14.891667 sshd[5638]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:14.896296 systemd[1]: Started session-15.scope. Jul 2 01:54:14.897410 systemd-logind[1455]: New session 15 of user core. Jul 2 01:54:14.903000 audit[5638]: USER_START pid=5638 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:14.904000 audit[5640]: CRED_ACQ pid=5640 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:15.309791 sshd[5638]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:15.310000 audit[5638]: USER_END pid=5638 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:15.310000 audit[5638]: CRED_DISP pid=5638 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:15.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.43:22-10.200.16.10:47996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:15.313092 systemd[1]: sshd@12-10.200.20.43:22-10.200.16.10:47996.service: Deactivated successfully. Jul 2 01:54:15.313883 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 01:54:15.314502 systemd-logind[1455]: Session 15 logged out. Waiting for processes to exit. Jul 2 01:54:15.315374 systemd-logind[1455]: Removed session 15. Jul 2 01:54:20.384278 systemd[1]: Started sshd@13-10.200.20.43:22-10.200.16.10:33074.service. Jul 2 01:54:20.389863 kernel: kauditd_printk_skb: 23 callbacks suppressed Jul 2 01:54:20.389972 kernel: audit: type=1130 audit(1719885260.382:1410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.43:22-10.200.16.10:33074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:20.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.43:22-10.200.16.10:33074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:20.839000 audit[5653]: USER_ACCT pid=5653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:20.841109 sshd[5653]: Accepted publickey for core from 10.200.16.10 port 33074 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:20.842781 sshd[5653]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:20.840000 audit[5653]: CRED_ACQ pid=5653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:20.869006 systemd[1]: Started session-16.scope. Jul 2 01:54:20.870339 systemd-logind[1455]: New session 16 of user core. Jul 2 01:54:20.884587 kernel: audit: type=1101 audit(1719885260.839:1411): pid=5653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:20.884668 kernel: audit: type=1103 audit(1719885260.840:1412): pid=5653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:20.898284 kernel: audit: type=1006 audit(1719885260.841:1413): pid=5653 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Jul 2 01:54:20.841000 audit[5653]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd7ba35d0 a2=3 a3=1 items=0 ppid=1 pid=5653 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:20.920563 kernel: audit: type=1300 audit(1719885260.841:1413): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd7ba35d0 a2=3 a3=1 items=0 ppid=1 pid=5653 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:20.841000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:20.928885 kernel: audit: type=1327 audit(1719885260.841:1413): proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:20.873000 audit[5653]: USER_START pid=5653 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:20.952694 kernel: audit: type=1105 audit(1719885260.873:1414): pid=5653 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:20.875000 audit[5655]: CRED_ACQ pid=5655 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:20.972541 kernel: audit: type=1103 audit(1719885260.875:1415): pid=5655 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:21.240117 sshd[5653]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:21.239000 audit[5653]: USER_END pid=5653 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:21.246880 systemd-logind[1455]: Session 16 logged out. Waiting for processes to exit. Jul 2 01:54:21.253516 systemd[1]: sshd@13-10.200.20.43:22-10.200.16.10:33074.service: Deactivated successfully. Jul 2 01:54:21.254434 systemd[1]: session-16.scope: Deactivated successfully. Jul 2 01:54:21.255721 systemd-logind[1455]: Removed session 16. Jul 2 01:54:21.239000 audit[5653]: CRED_DISP pid=5653 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:21.289502 kernel: audit: type=1106 audit(1719885261.239:1416): pid=5653 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:21.289633 kernel: audit: type=1104 audit(1719885261.239:1417): pid=5653 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:21.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.43:22-10.200.16.10:33074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:21.698000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:21.698000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000eed4c0 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:54:21.698000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:21.698000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:21.698000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a25110 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:54:21.698000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:22.143000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:22.143000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4008e32570 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:54:22.143000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:54:22.143000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521029 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:22.143000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4008b64ea0 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:54:22.143000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:54:22.149000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:22.149000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4008e32810 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:54:22.149000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:54:22.151000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:22.151000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400d44b020 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:54:22.151000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:54:22.287000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:22.287000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:22.287000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4008b65830 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:54:22.287000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:54:22.287000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400e262520 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:54:22.287000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:54:25.315179 systemd[1]: run-containerd-runc-k8s.io-fe5f4b011fb321da004a2f0932688887bc1f262fc8bb40b5694f79900be66653-runc.mjR8VS.mount: Deactivated successfully. Jul 2 01:54:26.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.43:22-10.200.16.10:33088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:26.318264 systemd[1]: Started sshd@14-10.200.20.43:22-10.200.16.10:33088.service. Jul 2 01:54:26.323191 kernel: kauditd_printk_skb: 25 callbacks suppressed Jul 2 01:54:26.323281 kernel: audit: type=1130 audit(1719885266.316:1427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.43:22-10.200.16.10:33088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:26.787000 audit[5695]: USER_ACCT pid=5695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:26.788393 sshd[5695]: Accepted publickey for core from 10.200.16.10 port 33088 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:26.791043 sshd[5695]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:26.790000 audit[5695]: CRED_ACQ pid=5695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:26.831632 kernel: audit: type=1101 audit(1719885266.787:1428): pid=5695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:26.831762 kernel: audit: type=1103 audit(1719885266.790:1429): pid=5695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:26.844987 kernel: audit: type=1006 audit(1719885266.790:1430): pid=5695 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Jul 2 01:54:26.790000 audit[5695]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd594cbe0 a2=3 a3=1 items=0 ppid=1 pid=5695 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:26.849106 systemd-logind[1455]: New session 17 of user core. Jul 2 01:54:26.849947 systemd[1]: Started session-17.scope. Jul 2 01:54:26.869340 kernel: audit: type=1300 audit(1719885266.790:1430): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd594cbe0 a2=3 a3=1 items=0 ppid=1 pid=5695 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:26.790000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:26.878382 kernel: audit: type=1327 audit(1719885266.790:1430): proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:26.869000 audit[5695]: USER_START pid=5695 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:26.903544 kernel: audit: type=1105 audit(1719885266.869:1431): pid=5695 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:26.872000 audit[5697]: CRED_ACQ pid=5697 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:26.924207 kernel: audit: type=1103 audit(1719885266.872:1432): pid=5697 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:27.210711 sshd[5695]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:27.211000 audit[5695]: USER_END pid=5695 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:27.214929 systemd[1]: session-17.scope: Deactivated successfully. Jul 2 01:54:27.215661 systemd[1]: sshd@14-10.200.20.43:22-10.200.16.10:33088.service: Deactivated successfully. Jul 2 01:54:27.236275 systemd-logind[1455]: Session 17 logged out. Waiting for processes to exit. Jul 2 01:54:27.237091 systemd-logind[1455]: Removed session 17. Jul 2 01:54:27.213000 audit[5695]: CRED_DISP pid=5695 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:27.256921 kernel: audit: type=1106 audit(1719885267.211:1433): pid=5695 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:27.257025 kernel: audit: type=1104 audit(1719885267.213:1434): pid=5695 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:27.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.43:22-10.200.16.10:33088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:31.608000 audit[5217]: AVC avc: denied { watch } for pid=5217 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_28.3368817371/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c629,c976 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c629,c976 tclass=file permissive=0 Jul 2 01:54:31.614212 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:54:31.614324 kernel: audit: type=1400 audit(1719885271.608:1436): avc: denied { watch } for pid=5217 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_28.3368817371/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c629,c976 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c629,c976 tclass=file permissive=0 Jul 2 01:54:31.608000 audit[5217]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40022a8a00 a2=fc6 a3=0 items=0 ppid=5090 pid=5217 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c629,c976 key=(null) Jul 2 01:54:31.666051 kernel: audit: type=1300 audit(1719885271.608:1436): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40022a8a00 a2=fc6 a3=0 items=0 ppid=5090 pid=5217 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c629,c976 key=(null) Jul 2 01:54:31.608000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:54:31.689154 kernel: audit: type=1327 audit(1719885271.608:1436): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:54:32.154000 audit[5254]: AVC avc: denied { watch } for pid=5254 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_28.1315374761/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c748 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c95,c748 tclass=file permissive=0 Jul 2 01:54:32.154000 audit[5254]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001e3e6a0 a2=fc6 a3=0 items=0 ppid=5163 pid=5254 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c748 key=(null) Jul 2 01:54:32.206412 kernel: audit: type=1400 audit(1719885272.154:1437): avc: denied { watch } for pid=5254 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_28.1315374761/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c748 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c95,c748 tclass=file permissive=0 Jul 2 01:54:32.206566 kernel: audit: type=1300 audit(1719885272.154:1437): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001e3e6a0 a2=fc6 a3=0 items=0 ppid=5163 pid=5254 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c748 key=(null) Jul 2 01:54:32.206614 kernel: audit: type=1327 audit(1719885272.154:1437): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:54:32.154000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:54:32.301027 systemd[1]: Started sshd@15-10.200.20.43:22-10.200.16.10:53536.service. Jul 2 01:54:32.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.43:22-10.200.16.10:53536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:32.324482 kernel: audit: type=1130 audit(1719885272.300:1438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.43:22-10.200.16.10:53536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:32.730000 audit[5712]: USER_ACCT pid=5712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:32.731710 sshd[5712]: Accepted publickey for core from 10.200.16.10 port 53536 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:32.754500 kernel: audit: type=1101 audit(1719885272.730:1439): pid=5712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:32.754963 sshd[5712]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:32.753000 audit[5712]: CRED_ACQ pid=5712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:32.790306 kernel: audit: type=1103 audit(1719885272.753:1440): pid=5712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:32.790444 kernel: audit: type=1006 audit(1719885272.753:1441): pid=5712 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Jul 2 01:54:32.753000 audit[5712]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff7d4aa20 a2=3 a3=1 items=0 ppid=1 pid=5712 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:32.753000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:32.793709 systemd-logind[1455]: New session 18 of user core. Jul 2 01:54:32.794242 systemd[1]: Started session-18.scope. Jul 2 01:54:32.798000 audit[5712]: USER_START pid=5712 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:32.800000 audit[5714]: CRED_ACQ pid=5714 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:33.136642 sshd[5712]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:33.137000 audit[5712]: USER_END pid=5712 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:33.137000 audit[5712]: CRED_DISP pid=5712 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:33.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.43:22-10.200.16.10:53536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:33.140137 systemd-logind[1455]: Session 18 logged out. Waiting for processes to exit. Jul 2 01:54:33.140319 systemd[1]: sshd@15-10.200.20.43:22-10.200.16.10:53536.service: Deactivated successfully. Jul 2 01:54:33.141116 systemd[1]: session-18.scope: Deactivated successfully. Jul 2 01:54:33.143132 systemd-logind[1455]: Removed session 18. Jul 2 01:54:37.626000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:37.632159 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 2 01:54:37.632276 kernel: audit: type=1400 audit(1719885277.626:1447): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:37.626000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a98040 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:54:37.679111 kernel: audit: type=1300 audit(1719885277.626:1447): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a98040 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:54:37.679231 kernel: audit: type=1327 audit(1719885277.626:1447): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:37.626000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:37.626000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:37.722255 kernel: audit: type=1400 audit(1719885277.626:1448): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:37.722383 kernel: audit: type=1300 audit(1719885277.626:1448): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a75160 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:54:37.626000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a75160 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:54:37.626000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:37.771840 kernel: audit: type=1327 audit(1719885277.626:1448): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:37.626000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:37.792697 kernel: audit: type=1400 audit(1719885277.626:1449): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:37.792814 kernel: audit: type=1300 audit(1719885277.626:1449): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a982e0 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:54:37.626000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a982e0 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:54:37.626000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:37.841970 kernel: audit: type=1327 audit(1719885277.626:1449): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:37.629000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:37.863844 kernel: audit: type=1400 audit(1719885277.629:1450): avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:54:37.629000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a986c0 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:54:37.629000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:54:38.217844 systemd[1]: Started sshd@16-10.200.20.43:22-10.200.16.10:53544.service. Jul 2 01:54:38.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.43:22-10.200.16.10:53544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:38.686000 audit[5743]: USER_ACCT pid=5743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:38.688018 sshd[5743]: Accepted publickey for core from 10.200.16.10 port 53544 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:38.687000 audit[5743]: CRED_ACQ pid=5743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:38.687000 audit[5743]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff08a46a0 a2=3 a3=1 items=0 ppid=1 pid=5743 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:38.687000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:38.689811 sshd[5743]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:38.694343 systemd[1]: Started session-19.scope. Jul 2 01:54:38.695509 systemd-logind[1455]: New session 19 of user core. Jul 2 01:54:38.698000 audit[5743]: USER_START pid=5743 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:38.699000 audit[5745]: CRED_ACQ pid=5745 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:39.106280 sshd[5743]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:39.105000 audit[5743]: USER_END pid=5743 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:39.105000 audit[5743]: CRED_DISP pid=5743 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:39.108971 systemd-logind[1455]: Session 19 logged out. Waiting for processes to exit. Jul 2 01:54:39.109135 systemd[1]: sshd@16-10.200.20.43:22-10.200.16.10:53544.service: Deactivated successfully. Jul 2 01:54:39.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.43:22-10.200.16.10:53544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:39.109895 systemd[1]: session-19.scope: Deactivated successfully. Jul 2 01:54:39.110632 systemd-logind[1455]: Removed session 19. Jul 2 01:54:39.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.43:22-10.200.16.10:41908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:39.184710 systemd[1]: Started sshd@17-10.200.20.43:22-10.200.16.10:41908.service. Jul 2 01:54:39.655000 audit[5754]: USER_ACCT pid=5754 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:39.656799 sshd[5754]: Accepted publickey for core from 10.200.16.10 port 41908 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:39.656000 audit[5754]: CRED_ACQ pid=5754 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:39.656000 audit[5754]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9f1e720 a2=3 a3=1 items=0 ppid=1 pid=5754 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:39.656000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:39.658422 sshd[5754]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:39.663555 systemd-logind[1455]: New session 20 of user core. Jul 2 01:54:39.663747 systemd[1]: Started session-20.scope. Jul 2 01:54:39.670000 audit[5754]: USER_START pid=5754 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:39.671000 audit[5759]: CRED_ACQ pid=5759 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:40.128771 sshd[5754]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:40.128000 audit[5754]: USER_END pid=5754 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:40.129000 audit[5754]: CRED_DISP pid=5754 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:40.132154 systemd[1]: session-20.scope: Deactivated successfully. Jul 2 01:54:40.132156 systemd-logind[1455]: Session 20 logged out. Waiting for processes to exit. Jul 2 01:54:40.133308 systemd[1]: sshd@17-10.200.20.43:22-10.200.16.10:41908.service: Deactivated successfully. Jul 2 01:54:40.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.43:22-10.200.16.10:41908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:40.134579 systemd-logind[1455]: Removed session 20. Jul 2 01:54:40.208541 systemd[1]: Started sshd@18-10.200.20.43:22-10.200.16.10:41924.service. Jul 2 01:54:40.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.43:22-10.200.16.10:41924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:40.603739 systemd[1]: run-containerd-runc-k8s.io-a89b44eb3a285f58cd79831b28528b64b7cf78c02a7c1423c2a558436f1b0182-runc.NCY8E2.mount: Deactivated successfully. Jul 2 01:54:40.687000 audit[5767]: USER_ACCT pid=5767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:40.689042 sshd[5767]: Accepted publickey for core from 10.200.16.10 port 41924 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:40.688000 audit[5767]: CRED_ACQ pid=5767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:40.688000 audit[5767]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd99cb1c0 a2=3 a3=1 items=0 ppid=1 pid=5767 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:40.688000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:40.690366 sshd[5767]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:40.695292 systemd[1]: Started session-21.scope. Jul 2 01:54:40.695677 systemd-logind[1455]: New session 21 of user core. Jul 2 01:54:40.699000 audit[5767]: USER_START pid=5767 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:40.700000 audit[5787]: CRED_ACQ pid=5787 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:42.452000 audit[5804]: NETFILTER_CFG table=filter:134 family=2 entries=20 op=nft_register_rule pid=5804 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:42.452000 audit[5804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff0c18780 a2=0 a3=1 items=0 ppid=2729 pid=5804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:42.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:42.453000 audit[5804]: NETFILTER_CFG table=nat:135 family=2 entries=22 op=nft_register_rule pid=5804 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:42.453000 audit[5804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff0c18780 a2=0 a3=1 items=0 ppid=2729 pid=5804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:42.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:42.467000 audit[5806]: NETFILTER_CFG table=filter:136 family=2 entries=32 op=nft_register_rule pid=5806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:42.467000 audit[5806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe1a11a30 a2=0 a3=1 items=0 ppid=2729 pid=5806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:42.467000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:42.468000 audit[5806]: NETFILTER_CFG table=nat:137 family=2 entries=22 op=nft_register_rule pid=5806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:42.468000 audit[5806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe1a11a30 a2=0 a3=1 items=0 ppid=2729 pid=5806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:42.468000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:42.540667 sshd[5767]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:42.540000 audit[5767]: USER_END pid=5767 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:42.540000 audit[5767]: CRED_DISP pid=5767 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:42.543723 systemd[1]: sshd@18-10.200.20.43:22-10.200.16.10:41924.service: Deactivated successfully. Jul 2 01:54:42.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.43:22-10.200.16.10:41924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:42.544502 systemd[1]: session-21.scope: Deactivated successfully. Jul 2 01:54:42.545020 systemd-logind[1455]: Session 21 logged out. Waiting for processes to exit. Jul 2 01:54:42.546031 systemd-logind[1455]: Removed session 21. Jul 2 01:54:42.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.43:22-10.200.16.10:41934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:42.617659 systemd[1]: Started sshd@19-10.200.20.43:22-10.200.16.10:41934.service. Jul 2 01:54:43.083000 audit[5809]: USER_ACCT pid=5809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:43.086407 sshd[5809]: Accepted publickey for core from 10.200.16.10 port 41934 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:43.090260 kernel: kauditd_printk_skb: 48 callbacks suppressed Jul 2 01:54:43.090494 kernel: audit: type=1101 audit(1719885283.083:1483): pid=5809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:43.096130 sshd[5809]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:43.094000 audit[5809]: CRED_ACQ pid=5809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:43.134583 kernel: audit: type=1103 audit(1719885283.094:1484): pid=5809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:43.151196 kernel: audit: type=1006 audit(1719885283.094:1485): pid=5809 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Jul 2 01:54:43.152333 systemd-logind[1455]: New session 22 of user core. Jul 2 01:54:43.152599 systemd[1]: Started session-22.scope. Jul 2 01:54:43.094000 audit[5809]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd433380 a2=3 a3=1 items=0 ppid=1 pid=5809 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:43.176565 kernel: audit: type=1300 audit(1719885283.094:1485): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd433380 a2=3 a3=1 items=0 ppid=1 pid=5809 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:43.094000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:43.184932 kernel: audit: type=1327 audit(1719885283.094:1485): proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:43.188000 audit[5809]: USER_START pid=5809 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:43.213000 audit[5811]: CRED_ACQ pid=5811 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:43.234932 kernel: audit: type=1105 audit(1719885283.188:1486): pid=5809 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:43.235060 kernel: audit: type=1103 audit(1719885283.213:1487): pid=5811 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:43.652676 sshd[5809]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:43.652000 audit[5809]: USER_END pid=5809 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:43.656979 systemd-logind[1455]: Session 22 logged out. Waiting for processes to exit. Jul 2 01:54:43.657840 systemd[1]: sshd@19-10.200.20.43:22-10.200.16.10:41934.service: Deactivated successfully. Jul 2 01:54:43.658730 systemd[1]: session-22.scope: Deactivated successfully. Jul 2 01:54:43.660061 systemd-logind[1455]: Removed session 22. Jul 2 01:54:43.652000 audit[5809]: CRED_DISP pid=5809 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:43.699068 kernel: audit: type=1106 audit(1719885283.652:1488): pid=5809 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:43.699194 kernel: audit: type=1104 audit(1719885283.652:1489): pid=5809 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:43.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.43:22-10.200.16.10:41934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:43.719242 kernel: audit: type=1131 audit(1719885283.656:1490): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.43:22-10.200.16.10:41934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:43.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.43:22-10.200.16.10:41948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:43.734551 systemd[1]: Started sshd@20-10.200.20.43:22-10.200.16.10:41948.service. Jul 2 01:54:44.163000 audit[5818]: USER_ACCT pid=5818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:44.165460 sshd[5818]: Accepted publickey for core from 10.200.16.10 port 41948 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:44.165000 audit[5818]: CRED_ACQ pid=5818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:44.165000 audit[5818]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc72e0090 a2=3 a3=1 items=0 ppid=1 pid=5818 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:44.165000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:44.166874 sshd[5818]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:44.172108 systemd-logind[1455]: New session 23 of user core. Jul 2 01:54:44.172489 systemd[1]: Started session-23.scope. Jul 2 01:54:44.175000 audit[5818]: USER_START pid=5818 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:44.177000 audit[5820]: CRED_ACQ pid=5820 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:44.551544 sshd[5818]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:44.551000 audit[5818]: USER_END pid=5818 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:44.551000 audit[5818]: CRED_DISP pid=5818 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:44.554324 systemd-logind[1455]: Session 23 logged out. Waiting for processes to exit. Jul 2 01:54:44.555010 systemd[1]: sshd@20-10.200.20.43:22-10.200.16.10:41948.service: Deactivated successfully. Jul 2 01:54:44.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.43:22-10.200.16.10:41948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:44.555789 systemd[1]: session-23.scope: Deactivated successfully. Jul 2 01:54:44.556492 systemd-logind[1455]: Removed session 23. Jul 2 01:54:49.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.43:22-10.200.16.10:58172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:49.629620 systemd[1]: Started sshd@21-10.200.20.43:22-10.200.16.10:58172.service. Jul 2 01:54:49.634663 kernel: kauditd_printk_skb: 11 callbacks suppressed Jul 2 01:54:49.634766 kernel: audit: type=1130 audit(1719885289.629:1500): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.43:22-10.200.16.10:58172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:50.098000 audit[5829]: USER_ACCT pid=5829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:50.098989 sshd[5829]: Accepted publickey for core from 10.200.16.10 port 58172 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:50.122238 sshd[5829]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:50.122500 kernel: audit: type=1101 audit(1719885290.098:1501): pid=5829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:50.121000 audit[5829]: CRED_ACQ pid=5829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:50.156502 kernel: audit: type=1103 audit(1719885290.121:1502): pid=5829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:50.156675 kernel: audit: type=1006 audit(1719885290.121:1503): pid=5829 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Jul 2 01:54:50.121000 audit[5829]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe51bf5e0 a2=3 a3=1 items=0 ppid=1 pid=5829 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:50.179289 kernel: audit: type=1300 audit(1719885290.121:1503): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe51bf5e0 a2=3 a3=1 items=0 ppid=1 pid=5829 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:50.121000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:50.187920 kernel: audit: type=1327 audit(1719885290.121:1503): proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:50.191286 systemd-logind[1455]: New session 24 of user core. Jul 2 01:54:50.191356 systemd[1]: Started session-24.scope. Jul 2 01:54:50.195000 audit[5829]: USER_START pid=5829 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:50.220785 kernel: audit: type=1105 audit(1719885290.195:1504): pid=5829 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:50.220871 kernel: audit: type=1103 audit(1719885290.220:1505): pid=5831 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:50.220000 audit[5831]: CRED_ACQ pid=5831 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:50.559218 sshd[5829]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:50.559000 audit[5829]: USER_END pid=5829 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:50.563194 systemd[1]: sshd@21-10.200.20.43:22-10.200.16.10:58172.service: Deactivated successfully. Jul 2 01:54:50.564053 systemd[1]: session-24.scope: Deactivated successfully. Jul 2 01:54:50.559000 audit[5829]: CRED_DISP pid=5829 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:50.585325 systemd-logind[1455]: Session 24 logged out. Waiting for processes to exit. Jul 2 01:54:50.605477 kernel: audit: type=1106 audit(1719885290.559:1506): pid=5829 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:50.605616 kernel: audit: type=1104 audit(1719885290.559:1507): pid=5829 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:50.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.43:22-10.200.16.10:58172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:50.608022 systemd-logind[1455]: Removed session 24. Jul 2 01:54:51.236000 audit[5841]: NETFILTER_CFG table=filter:138 family=2 entries=20 op=nft_register_rule pid=5841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:51.236000 audit[5841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe7dd8950 a2=0 a3=1 items=0 ppid=2729 pid=5841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:51.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:51.238000 audit[5841]: NETFILTER_CFG table=nat:139 family=2 entries=106 op=nft_register_chain pid=5841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 01:54:51.238000 audit[5841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffe7dd8950 a2=0 a3=1 items=0 ppid=2729 pid=5841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:51.238000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 01:54:55.313069 systemd[1]: run-containerd-runc-k8s.io-fe5f4b011fb321da004a2f0932688887bc1f262fc8bb40b5694f79900be66653-runc.L4lCCl.mount: Deactivated successfully. Jul 2 01:54:55.632611 systemd[1]: Started sshd@22-10.200.20.43:22-10.200.16.10:58180.service. Jul 2 01:54:55.659064 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 2 01:54:55.659208 kernel: audit: type=1130 audit(1719885295.631:1511): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.43:22-10.200.16.10:58180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:55.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.43:22-10.200.16.10:58180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:56.068000 audit[5871]: USER_ACCT pid=5871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:56.070362 sshd[5871]: Accepted publickey for core from 10.200.16.10 port 58180 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:54:56.092000 audit[5871]: CRED_ACQ pid=5871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:56.094240 sshd[5871]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:54:56.114723 kernel: audit: type=1101 audit(1719885296.068:1512): pid=5871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:56.114836 kernel: audit: type=1103 audit(1719885296.092:1513): pid=5871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:56.128364 kernel: audit: type=1006 audit(1719885296.092:1514): pid=5871 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Jul 2 01:54:56.092000 audit[5871]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdf3197a0 a2=3 a3=1 items=0 ppid=1 pid=5871 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:56.150580 kernel: audit: type=1300 audit(1719885296.092:1514): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdf3197a0 a2=3 a3=1 items=0 ppid=1 pid=5871 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:54:56.092000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:56.159375 kernel: audit: type=1327 audit(1719885296.092:1514): proctitle=737368643A20636F7265205B707269765D Jul 2 01:54:56.163043 systemd-logind[1455]: New session 25 of user core. Jul 2 01:54:56.163538 systemd[1]: Started session-25.scope. Jul 2 01:54:56.166000 audit[5871]: USER_START pid=5871 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:56.191000 audit[5873]: CRED_ACQ pid=5873 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:56.213145 kernel: audit: type=1105 audit(1719885296.166:1515): pid=5871 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:56.213277 kernel: audit: type=1103 audit(1719885296.191:1516): pid=5873 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:56.519600 sshd[5871]: pam_unix(sshd:session): session closed for user core Jul 2 01:54:56.519000 audit[5871]: USER_END pid=5871 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:56.519000 audit[5871]: CRED_DISP pid=5871 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:56.545736 systemd[1]: sshd@22-10.200.20.43:22-10.200.16.10:58180.service: Deactivated successfully. Jul 2 01:54:56.546602 systemd[1]: session-25.scope: Deactivated successfully. Jul 2 01:54:56.565761 kernel: audit: type=1106 audit(1719885296.519:1517): pid=5871 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:56.565897 kernel: audit: type=1104 audit(1719885296.519:1518): pid=5871 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:54:56.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.43:22-10.200.16.10:58180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:54:56.566542 systemd-logind[1455]: Session 25 logged out. Waiting for processes to exit. Jul 2 01:54:56.567526 systemd-logind[1455]: Removed session 25. Jul 2 01:55:01.600777 systemd[1]: Started sshd@23-10.200.20.43:22-10.200.16.10:43824.service. Jul 2 01:55:01.626180 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:55:01.626307 kernel: audit: type=1130 audit(1719885301.599:1520): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.43:22-10.200.16.10:43824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:55:01.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.43:22-10.200.16.10:43824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:55:02.065000 audit[5889]: USER_ACCT pid=5889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:02.067298 sshd[5889]: Accepted publickey for core from 10.200.16.10 port 43824 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:55:02.069168 sshd[5889]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:55:02.067000 audit[5889]: CRED_ACQ pid=5889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:02.118350 kernel: audit: type=1101 audit(1719885302.065:1521): pid=5889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:02.118501 kernel: audit: type=1103 audit(1719885302.067:1522): pid=5889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:02.133359 kernel: audit: type=1006 audit(1719885302.067:1523): pid=5889 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Jul 2 01:55:02.067000 audit[5889]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe32e3bb0 a2=3 a3=1 items=0 ppid=1 pid=5889 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:02.157399 kernel: audit: type=1300 audit(1719885302.067:1523): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe32e3bb0 a2=3 a3=1 items=0 ppid=1 pid=5889 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:02.067000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:55:02.165275 kernel: audit: type=1327 audit(1719885302.067:1523): proctitle=737368643A20636F7265205B707269765D Jul 2 01:55:02.165448 systemd-logind[1455]: New session 26 of user core. Jul 2 01:55:02.166161 systemd[1]: Started session-26.scope. Jul 2 01:55:02.169000 audit[5889]: USER_START pid=5889 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:02.170000 audit[5891]: CRED_ACQ pid=5891 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:02.215689 kernel: audit: type=1105 audit(1719885302.169:1524): pid=5889 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:02.215793 kernel: audit: type=1103 audit(1719885302.170:1525): pid=5891 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:02.513249 sshd[5889]: pam_unix(sshd:session): session closed for user core Jul 2 01:55:02.512000 audit[5889]: USER_END pid=5889 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:02.512000 audit[5889]: CRED_DISP pid=5889 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:02.541331 systemd[1]: sshd@23-10.200.20.43:22-10.200.16.10:43824.service: Deactivated successfully. Jul 2 01:55:02.542206 systemd[1]: session-26.scope: Deactivated successfully. Jul 2 01:55:02.560905 kernel: audit: type=1106 audit(1719885302.512:1526): pid=5889 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:02.561041 kernel: audit: type=1104 audit(1719885302.512:1527): pid=5889 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:02.561109 systemd-logind[1455]: Session 26 logged out. Waiting for processes to exit. Jul 2 01:55:02.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.43:22-10.200.16.10:43824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:55:02.562100 systemd-logind[1455]: Removed session 26. Jul 2 01:55:03.305620 systemd[1]: run-containerd-runc-k8s.io-a89b44eb3a285f58cd79831b28528b64b7cf78c02a7c1423c2a558436f1b0182-runc.jDwdxR.mount: Deactivated successfully. Jul 2 01:55:07.616193 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:55:07.616326 kernel: audit: type=1130 audit(1719885307.591:1529): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.43:22-10.200.16.10:43838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:55:07.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.43:22-10.200.16.10:43838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:55:07.591872 systemd[1]: Started sshd@24-10.200.20.43:22-10.200.16.10:43838.service. Jul 2 01:55:08.057000 audit[5928]: USER_ACCT pid=5928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:08.058042 sshd[5928]: Accepted publickey for core from 10.200.16.10 port 43838 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:55:08.059984 sshd[5928]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:55:08.059000 audit[5928]: CRED_ACQ pid=5928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:08.101678 kernel: audit: type=1101 audit(1719885308.057:1530): pid=5928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:08.101825 kernel: audit: type=1103 audit(1719885308.059:1531): pid=5928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:08.114601 kernel: audit: type=1006 audit(1719885308.059:1532): pid=5928 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Jul 2 01:55:08.059000 audit[5928]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffcabc2b0 a2=3 a3=1 items=0 ppid=1 pid=5928 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:08.136649 kernel: audit: type=1300 audit(1719885308.059:1532): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffcabc2b0 a2=3 a3=1 items=0 ppid=1 pid=5928 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:08.059000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:55:08.141035 systemd-logind[1455]: New session 27 of user core. Jul 2 01:55:08.141647 systemd[1]: Started session-27.scope. Jul 2 01:55:08.144685 kernel: audit: type=1327 audit(1719885308.059:1532): proctitle=737368643A20636F7265205B707269765D Jul 2 01:55:08.146000 audit[5928]: USER_START pid=5928 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:08.171000 audit[5930]: CRED_ACQ pid=5930 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:08.191805 kernel: audit: type=1105 audit(1719885308.146:1533): pid=5928 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:08.191913 kernel: audit: type=1103 audit(1719885308.171:1534): pid=5930 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:08.515681 sshd[5928]: pam_unix(sshd:session): session closed for user core Jul 2 01:55:08.516000 audit[5928]: USER_END pid=5928 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:08.541783 systemd[1]: sshd@24-10.200.20.43:22-10.200.16.10:43838.service: Deactivated successfully. Jul 2 01:55:08.518000 audit[5928]: CRED_DISP pid=5928 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:08.542488 kernel: audit: type=1106 audit(1719885308.516:1535): pid=5928 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:08.542578 systemd[1]: session-27.scope: Deactivated successfully. Jul 2 01:55:08.562363 systemd-logind[1455]: Session 27 logged out. Waiting for processes to exit. Jul 2 01:55:08.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.43:22-10.200.16.10:43838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:55:08.563366 systemd-logind[1455]: Removed session 27. Jul 2 01:55:08.563501 kernel: audit: type=1104 audit(1719885308.518:1536): pid=5928 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:13.588333 systemd[1]: Started sshd@25-10.200.20.43:22-10.200.16.10:44932.service. Jul 2 01:55:13.616879 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:55:13.617035 kernel: audit: type=1130 audit(1719885313.588:1538): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.43:22-10.200.16.10:44932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:55:13.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.43:22-10.200.16.10:44932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:55:14.018000 audit[5944]: USER_ACCT pid=5944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:14.019651 sshd[5944]: Accepted publickey for core from 10.200.16.10 port 44932 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:55:14.021479 sshd[5944]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:55:14.020000 audit[5944]: CRED_ACQ pid=5944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:14.065507 kernel: audit: type=1101 audit(1719885314.018:1539): pid=5944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:14.065678 kernel: audit: type=1103 audit(1719885314.020:1540): pid=5944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:14.079543 kernel: audit: type=1006 audit(1719885314.020:1541): pid=5944 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Jul 2 01:55:14.020000 audit[5944]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff409d790 a2=3 a3=1 items=0 ppid=1 pid=5944 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:14.102980 kernel: audit: type=1300 audit(1719885314.020:1541): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff409d790 a2=3 a3=1 items=0 ppid=1 pid=5944 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:14.020000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:55:14.111249 kernel: audit: type=1327 audit(1719885314.020:1541): proctitle=737368643A20636F7265205B707269765D Jul 2 01:55:14.113515 systemd-logind[1455]: New session 28 of user core. Jul 2 01:55:14.113747 systemd[1]: Started session-28.scope. Jul 2 01:55:14.117000 audit[5944]: USER_START pid=5944 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:14.119000 audit[5951]: CRED_ACQ pid=5951 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:14.163832 kernel: audit: type=1105 audit(1719885314.117:1542): pid=5944 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:14.163915 kernel: audit: type=1103 audit(1719885314.119:1543): pid=5951 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:14.449686 sshd[5944]: pam_unix(sshd:session): session closed for user core Jul 2 01:55:14.450000 audit[5944]: USER_END pid=5944 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:14.452561 systemd[1]: session-28.scope: Deactivated successfully. Jul 2 01:55:14.453478 systemd[1]: sshd@25-10.200.20.43:22-10.200.16.10:44932.service: Deactivated successfully. Jul 2 01:55:14.450000 audit[5944]: CRED_DISP pid=5944 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:14.501947 kernel: audit: type=1106 audit(1719885314.450:1544): pid=5944 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:14.502058 kernel: audit: type=1104 audit(1719885314.450:1545): pid=5944 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:14.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.43:22-10.200.16.10:44932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:55:14.502379 systemd-logind[1455]: Session 28 logged out. Waiting for processes to exit. Jul 2 01:55:14.503584 systemd-logind[1455]: Removed session 28. Jul 2 01:55:19.554122 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 01:55:19.557595 kernel: audit: type=1130 audit(1719885319.526:1547): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.43:22-10.200.16.10:58198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:55:19.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.43:22-10.200.16.10:58198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:55:19.528209 systemd[1]: Started sshd@26-10.200.20.43:22-10.200.16.10:58198.service. Jul 2 01:55:19.993000 audit[5961]: USER_ACCT pid=5961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:19.996543 sshd[5961]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:55:19.997420 sshd[5961]: Accepted publickey for core from 10.200.16.10 port 58198 ssh2: RSA SHA256:dIfkHgYeMkxYvU2An9TnjkrclLrmoTNY/YaaZP40c9o Jul 2 01:55:19.994000 audit[5961]: CRED_ACQ pid=5961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:20.039125 kernel: audit: type=1101 audit(1719885319.993:1548): pid=5961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:20.039259 kernel: audit: type=1103 audit(1719885319.994:1549): pid=5961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:20.052372 kernel: audit: type=1006 audit(1719885319.994:1550): pid=5961 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Jul 2 01:55:19.994000 audit[5961]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdcc5cc90 a2=3 a3=1 items=0 ppid=1 pid=5961 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:20.075845 kernel: audit: type=1300 audit(1719885319.994:1550): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdcc5cc90 a2=3 a3=1 items=0 ppid=1 pid=5961 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:20.077928 systemd-logind[1455]: New session 29 of user core. Jul 2 01:55:19.994000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:55:20.078342 systemd[1]: Started session-29.scope. Jul 2 01:55:20.086086 kernel: audit: type=1327 audit(1719885319.994:1550): proctitle=737368643A20636F7265205B707269765D Jul 2 01:55:20.088000 audit[5961]: USER_START pid=5961 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:20.113000 audit[5963]: CRED_ACQ pid=5963 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:20.136245 kernel: audit: type=1105 audit(1719885320.088:1551): pid=5961 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:20.136356 kernel: audit: type=1103 audit(1719885320.113:1552): pid=5963 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:20.458335 sshd[5961]: pam_unix(sshd:session): session closed for user core Jul 2 01:55:20.457000 audit[5961]: USER_END pid=5961 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:20.462050 systemd-logind[1455]: Session 29 logged out. Waiting for processes to exit. Jul 2 01:55:20.463397 systemd[1]: session-29.scope: Deactivated successfully. Jul 2 01:55:20.464761 systemd-logind[1455]: Removed session 29. Jul 2 01:55:20.465616 systemd[1]: sshd@26-10.200.20.43:22-10.200.16.10:58198.service: Deactivated successfully. Jul 2 01:55:20.457000 audit[5961]: CRED_DISP pid=5961 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:20.506956 kernel: audit: type=1106 audit(1719885320.457:1553): pid=5961 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:20.507051 kernel: audit: type=1104 audit(1719885320.457:1554): pid=5961 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Jul 2 01:55:20.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.43:22-10.200.16.10:58198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:55:21.699000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:21.699000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40033414c0 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:55:21.699000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:21.699000 audit[2459]: AVC avc: denied { watch } for pid=2459 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:21.699000 audit[2459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001b59a40 a2=fc6 a3=0 items=0 ppid=2321 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:55:21.699000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:22.145000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521029 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:22.145000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:22.145000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=4005db2f60 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:55:22.145000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:55:22.145000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=40049c3ad0 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:55:22.145000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:55:22.149000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:22.149000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4005db2f90 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:55:22.149000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:55:22.152000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:22.152000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=40051b58e0 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:55:22.152000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:55:22.288000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:22.288000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4005db3200 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:55:22.288000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:55:22.288000 audit[2404]: AVC avc: denied { watch } for pid=2404 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:22.288000 audit[2404]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=40058965e0 a2=fc6 a3=0 items=0 ppid=2283 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c520 key=(null) Jul 2 01:55:22.288000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3433002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 01:55:31.610000 audit[5217]: AVC avc: denied { watch } for pid=5217 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_28.3368817371/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c629,c976 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c629,c976 tclass=file permissive=0 Jul 2 01:55:31.615367 kernel: kauditd_printk_skb: 25 callbacks suppressed Jul 2 01:55:31.615504 kernel: audit: type=1400 audit(1719885331.610:1564): avc: denied { watch } for pid=5217 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_28.3368817371/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c629,c976 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c629,c976 tclass=file permissive=0 Jul 2 01:55:31.610000 audit[5217]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40022a9320 a2=fc6 a3=0 items=0 ppid=5090 pid=5217 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c629,c976 key=(null) Jul 2 01:55:31.666888 kernel: audit: type=1300 audit(1719885331.610:1564): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40022a9320 a2=fc6 a3=0 items=0 ppid=5090 pid=5217 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c629,c976 key=(null) Jul 2 01:55:31.610000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:55:31.689824 kernel: audit: type=1327 audit(1719885331.610:1564): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:55:32.156000 audit[5254]: AVC avc: denied { watch } for pid=5254 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_28.1315374761/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c748 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c95,c748 tclass=file permissive=0 Jul 2 01:55:32.156000 audit[5254]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000f52340 a2=fc6 a3=0 items=0 ppid=5163 pid=5254 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c748 key=(null) Jul 2 01:55:32.207630 kernel: audit: type=1400 audit(1719885332.156:1565): avc: denied { watch } for pid=5254 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_01_52_28.1315374761/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c748 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c95,c748 tclass=file permissive=0 Jul 2 01:55:32.207764 kernel: audit: type=1300 audit(1719885332.156:1565): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000f52340 a2=fc6 a3=0 items=0 ppid=5163 pid=5254 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c748 key=(null) Jul 2 01:55:32.156000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:55:32.230044 kernel: audit: type=1327 audit(1719885332.156:1565): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 01:55:34.871831 systemd[1]: cri-containerd-d7a28e675aa28c5b0ff4314c8869312405896b666e65a9d511815206bec6be6f.scope: Deactivated successfully. Jul 2 01:55:34.872130 systemd[1]: cri-containerd-d7a28e675aa28c5b0ff4314c8869312405896b666e65a9d511815206bec6be6f.scope: Consumed 3.229s CPU time. Jul 2 01:55:34.875000 audit: BPF prog-id=75 op=UNLOAD Jul 2 01:55:34.875000 audit: BPF prog-id=82 op=UNLOAD Jul 2 01:55:34.887986 kernel: audit: type=1334 audit(1719885334.875:1566): prog-id=75 op=UNLOAD Jul 2 01:55:34.888069 kernel: audit: type=1334 audit(1719885334.875:1567): prog-id=82 op=UNLOAD Jul 2 01:55:34.900522 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d7a28e675aa28c5b0ff4314c8869312405896b666e65a9d511815206bec6be6f-rootfs.mount: Deactivated successfully. Jul 2 01:55:34.902172 env[1471]: time="2024-07-02T01:55:34.902119946Z" level=info msg="shim disconnected" id=d7a28e675aa28c5b0ff4314c8869312405896b666e65a9d511815206bec6be6f Jul 2 01:55:34.902529 env[1471]: time="2024-07-02T01:55:34.902505083Z" level=warning msg="cleaning up after shim disconnected" id=d7a28e675aa28c5b0ff4314c8869312405896b666e65a9d511815206bec6be6f namespace=k8s.io Jul 2 01:55:34.902608 env[1471]: time="2024-07-02T01:55:34.902593607Z" level=info msg="cleaning up dead shim" Jul 2 01:55:34.909762 env[1471]: time="2024-07-02T01:55:34.909724886Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:55:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6050 runtime=io.containerd.runc.v2\n" Jul 2 01:55:35.297819 kubelet[2592]: E0702 01:55:35.297708 2592 controller.go:195] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.43:53302->10.200.20.31:2379: read: connection timed out" Jul 2 01:55:35.300494 systemd[1]: cri-containerd-53de41a1e1ad344b140ace82c44bfb1e6c59579124657ecc213a7ef2b61ab9c9.scope: Deactivated successfully. Jul 2 01:55:35.300800 systemd[1]: cri-containerd-53de41a1e1ad344b140ace82c44bfb1e6c59579124657ecc213a7ef2b61ab9c9.scope: Consumed 1.958s CPU time. Jul 2 01:55:35.302000 audit: BPF prog-id=79 op=UNLOAD Jul 2 01:55:35.302000 audit: BPF prog-id=90 op=UNLOAD Jul 2 01:55:35.315123 kernel: audit: type=1334 audit(1719885335.302:1568): prog-id=79 op=UNLOAD Jul 2 01:55:35.315304 kernel: audit: type=1334 audit(1719885335.302:1569): prog-id=90 op=UNLOAD Jul 2 01:55:35.322000 audit: BPF prog-id=112 op=UNLOAD Jul 2 01:55:35.322371 systemd[1]: cri-containerd-5b394df8f756b7cd1db9651ce5f7510eed2cd296a4eab6c50599268a56e83cdc.scope: Deactivated successfully. Jul 2 01:55:35.322692 systemd[1]: cri-containerd-5b394df8f756b7cd1db9651ce5f7510eed2cd296a4eab6c50599268a56e83cdc.scope: Consumed 5.879s CPU time. Jul 2 01:55:35.328000 audit: BPF prog-id=115 op=UNLOAD Jul 2 01:55:35.327782 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-53de41a1e1ad344b140ace82c44bfb1e6c59579124657ecc213a7ef2b61ab9c9-rootfs.mount: Deactivated successfully. Jul 2 01:55:35.331181 env[1471]: time="2024-07-02T01:55:35.331140818Z" level=info msg="shim disconnected" id=53de41a1e1ad344b140ace82c44bfb1e6c59579124657ecc213a7ef2b61ab9c9 Jul 2 01:55:35.331369 env[1471]: time="2024-07-02T01:55:35.331351668Z" level=warning msg="cleaning up after shim disconnected" id=53de41a1e1ad344b140ace82c44bfb1e6c59579124657ecc213a7ef2b61ab9c9 namespace=k8s.io Jul 2 01:55:35.331519 env[1471]: time="2024-07-02T01:55:35.331435551Z" level=info msg="cleaning up dead shim" Jul 2 01:55:35.341404 env[1471]: time="2024-07-02T01:55:35.341371435Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:55:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6075 runtime=io.containerd.runc.v2\n" Jul 2 01:55:35.351173 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5b394df8f756b7cd1db9651ce5f7510eed2cd296a4eab6c50599268a56e83cdc-rootfs.mount: Deactivated successfully. Jul 2 01:55:35.352809 env[1471]: time="2024-07-02T01:55:35.352701700Z" level=info msg="shim disconnected" id=5b394df8f756b7cd1db9651ce5f7510eed2cd296a4eab6c50599268a56e83cdc Jul 2 01:55:35.353783 env[1471]: time="2024-07-02T01:55:35.352824746Z" level=warning msg="cleaning up after shim disconnected" id=5b394df8f756b7cd1db9651ce5f7510eed2cd296a4eab6c50599268a56e83cdc namespace=k8s.io Jul 2 01:55:35.353783 env[1471]: time="2024-07-02T01:55:35.352836306Z" level=info msg="cleaning up dead shim" Jul 2 01:55:35.361304 env[1471]: time="2024-07-02T01:55:35.361233241Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:55:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6098 runtime=io.containerd.runc.v2\n" Jul 2 01:55:35.438895 kubelet[2592]: I0702 01:55:35.438770 2592 scope.go:117] "RemoveContainer" containerID="53de41a1e1ad344b140ace82c44bfb1e6c59579124657ecc213a7ef2b61ab9c9" Jul 2 01:55:35.442354 env[1471]: time="2024-07-02T01:55:35.442306419Z" level=info msg="CreateContainer within sandbox \"55685407b3b0e00c79f8750426eac2d7a1c17f29a08f4be8b35491ea6ea0471d\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Jul 2 01:55:35.443436 kubelet[2592]: I0702 01:55:35.443141 2592 scope.go:117] "RemoveContainer" containerID="5b394df8f756b7cd1db9651ce5f7510eed2cd296a4eab6c50599268a56e83cdc" Jul 2 01:55:35.445731 kubelet[2592]: I0702 01:55:35.445714 2592 scope.go:117] "RemoveContainer" containerID="d7a28e675aa28c5b0ff4314c8869312405896b666e65a9d511815206bec6be6f" Jul 2 01:55:35.447580 env[1471]: time="2024-07-02T01:55:35.447545773Z" level=info msg="CreateContainer within sandbox \"53669b317529703d05f67509cdd398d5c6487e318970619b007843c85c8a9326\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Jul 2 01:55:35.448735 env[1471]: time="2024-07-02T01:55:35.448698144Z" level=info msg="CreateContainer within sandbox \"ba34a54d167ae3a82c0d679d6248ddc5f52e45523d31c08e59df7ab63a2a6f12\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Jul 2 01:55:35.483500 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1094499245.mount: Deactivated successfully. Jul 2 01:55:35.518436 env[1471]: time="2024-07-02T01:55:35.518380414Z" level=info msg="CreateContainer within sandbox \"55685407b3b0e00c79f8750426eac2d7a1c17f29a08f4be8b35491ea6ea0471d\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"031609ea9c504c3c3df14fffe537d6e892836ca4b409c0fdceef0ceacec54388\"" Jul 2 01:55:35.518986 env[1471]: time="2024-07-02T01:55:35.518961280Z" level=info msg="StartContainer for \"031609ea9c504c3c3df14fffe537d6e892836ca4b409c0fdceef0ceacec54388\"" Jul 2 01:55:35.534674 systemd[1]: Started cri-containerd-031609ea9c504c3c3df14fffe537d6e892836ca4b409c0fdceef0ceacec54388.scope. Jul 2 01:55:35.540617 env[1471]: time="2024-07-02T01:55:35.540579565Z" level=info msg="CreateContainer within sandbox \"53669b317529703d05f67509cdd398d5c6487e318970619b007843c85c8a9326\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"c5e0de5790309721610f7014edf4b641c9833ea15188b4ab59a1803f06271d8c\"" Jul 2 01:55:35.541698 env[1471]: time="2024-07-02T01:55:35.541669893Z" level=info msg="StartContainer for \"c5e0de5790309721610f7014edf4b641c9833ea15188b4ab59a1803f06271d8c\"" Jul 2 01:55:35.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.552000 audit: BPF prog-id=206 op=LOAD Jul 2 01:55:35.554016 env[1471]: time="2024-07-02T01:55:35.553895799Z" level=info msg="CreateContainer within sandbox \"ba34a54d167ae3a82c0d679d6248ddc5f52e45523d31c08e59df7ab63a2a6f12\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"6dc6d46e9ae70574c42cd1d024e87cfb6dd70901d60777437bd1d8a155e2bc77\"" Jul 2 01:55:35.554434 env[1471]: time="2024-07-02T01:55:35.554409182Z" level=info msg="StartContainer for \"6dc6d46e9ae70574c42cd1d024e87cfb6dd70901d60777437bd1d8a155e2bc77\"" Jul 2 01:55:35.554000 audit[6126]: AVC avc: denied { bpf } for pid=6126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.554000 audit[6126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2335 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:35.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033313630396561396335303463336333646631346666666535333764 Jul 2 01:55:35.555000 audit[6126]: AVC avc: denied { perfmon } for pid=6126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.555000 audit[6126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2335 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:35.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033313630396561396335303463336333646631346666666535333764 Jul 2 01:55:35.555000 audit[6126]: AVC avc: denied { bpf } for pid=6126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.555000 audit[6126]: AVC avc: denied { bpf } for pid=6126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.555000 audit[6126]: AVC avc: denied { bpf } for pid=6126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.555000 audit[6126]: AVC avc: denied { perfmon } for pid=6126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.555000 audit[6126]: AVC avc: denied { perfmon } for pid=6126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.555000 audit[6126]: AVC avc: denied { perfmon } for pid=6126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.555000 audit[6126]: AVC avc: denied { perfmon } for pid=6126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.555000 audit[6126]: AVC avc: denied { perfmon } for pid=6126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.555000 audit[6126]: AVC avc: denied { bpf } for pid=6126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.555000 audit[6126]: AVC avc: denied { bpf } for pid=6126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.555000 audit: BPF prog-id=207 op=LOAD Jul 2 01:55:35.555000 audit[6126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2335 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:35.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033313630396561396335303463336333646631346666666535333764 Jul 2 01:55:35.556000 audit[6126]: AVC avc: denied { bpf } for pid=6126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.556000 audit[6126]: AVC avc: denied { bpf } for pid=6126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.556000 audit[6126]: AVC avc: denied { perfmon } for pid=6126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.556000 audit[6126]: AVC avc: denied { perfmon } for pid=6126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.556000 audit[6126]: AVC avc: denied { perfmon } for pid=6126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.556000 audit[6126]: AVC avc: denied { perfmon } for pid=6126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.556000 audit[6126]: AVC avc: denied { perfmon } for pid=6126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.556000 audit[6126]: AVC avc: denied { bpf } for pid=6126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.556000 audit[6126]: AVC avc: denied { bpf } for pid=6126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.556000 audit: BPF prog-id=208 op=LOAD Jul 2 01:55:35.556000 audit[6126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2335 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:35.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033313630396561396335303463336333646631346666666535333764 Jul 2 01:55:35.560000 audit: BPF prog-id=208 op=UNLOAD Jul 2 01:55:35.560000 audit: BPF prog-id=207 op=UNLOAD Jul 2 01:55:35.560000 audit[6126]: AVC avc: denied { bpf } for pid=6126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.560000 audit[6126]: AVC avc: denied { bpf } for pid=6126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.560000 audit[6126]: AVC avc: denied { bpf } for pid=6126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.560000 audit[6126]: AVC avc: denied { perfmon } for pid=6126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.560000 audit[6126]: AVC avc: denied { perfmon } for pid=6126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.560000 audit[6126]: AVC avc: denied { perfmon } for pid=6126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.560000 audit[6126]: AVC avc: denied { perfmon } for pid=6126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.560000 audit[6126]: AVC avc: denied { perfmon } for pid=6126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.560000 audit[6126]: AVC avc: denied { bpf } for pid=6126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.560000 audit[6126]: AVC avc: denied { bpf } for pid=6126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.560000 audit: BPF prog-id=209 op=LOAD Jul 2 01:55:35.560000 audit[6126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2335 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:35.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033313630396561396335303463336333646631346666666535333764 Jul 2 01:55:35.561573 systemd[1]: Started cri-containerd-c5e0de5790309721610f7014edf4b641c9833ea15188b4ab59a1803f06271d8c.scope. Jul 2 01:55:35.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.592000 audit: BPF prog-id=210 op=LOAD Jul 2 01:55:35.593000 audit[6149]: AVC avc: denied { bpf } for pid=6149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.593000 audit[6149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2784 pid=6149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:35.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335653064653537393033303937323136313066373031346564663462 Jul 2 01:55:35.593000 audit[6149]: AVC avc: denied { perfmon } for pid=6149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.593000 audit[6149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2784 pid=6149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:35.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335653064653537393033303937323136313066373031346564663462 Jul 2 01:55:35.593000 audit[6149]: AVC avc: denied { bpf } for pid=6149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.593000 audit[6149]: AVC avc: denied { bpf } for pid=6149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.593000 audit[6149]: AVC avc: denied { bpf } for pid=6149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.593000 audit[6149]: AVC avc: denied { perfmon } for pid=6149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.593000 audit[6149]: AVC avc: denied { perfmon } for pid=6149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.593000 audit[6149]: AVC avc: denied { perfmon } for pid=6149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.593000 audit[6149]: AVC avc: denied { perfmon } for pid=6149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.593000 audit[6149]: AVC avc: denied { perfmon } for pid=6149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.593000 audit[6149]: AVC avc: denied { bpf } for pid=6149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.593000 audit[6149]: AVC avc: denied { bpf } for pid=6149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.593000 audit: BPF prog-id=211 op=LOAD Jul 2 01:55:35.593000 audit[6149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2784 pid=6149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:35.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335653064653537393033303937323136313066373031346564663462 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { bpf } for pid=6149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { bpf } for pid=6149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { perfmon } for pid=6149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { perfmon } for pid=6149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { perfmon } for pid=6149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { perfmon } for pid=6149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { perfmon } for pid=6149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { bpf } for pid=6149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { bpf } for pid=6149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit: BPF prog-id=212 op=LOAD Jul 2 01:55:35.594000 audit[6149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2784 pid=6149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:35.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335653064653537393033303937323136313066373031346564663462 Jul 2 01:55:35.594000 audit: BPF prog-id=212 op=UNLOAD Jul 2 01:55:35.594000 audit: BPF prog-id=211 op=UNLOAD Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { bpf } for pid=6149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { bpf } for pid=6149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { bpf } for pid=6149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { perfmon } for pid=6149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { perfmon } for pid=6149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { perfmon } for pid=6149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { perfmon } for pid=6149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { perfmon } for pid=6149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { bpf } for pid=6149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit[6149]: AVC avc: denied { bpf } for pid=6149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.594000 audit: BPF prog-id=213 op=LOAD Jul 2 01:55:35.594000 audit[6149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2784 pid=6149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:35.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335653064653537393033303937323136313066373031346564663462 Jul 2 01:55:35.597936 systemd[1]: Started cri-containerd-6dc6d46e9ae70574c42cd1d024e87cfb6dd70901d60777437bd1d8a155e2bc77.scope. Jul 2 01:55:35.606911 env[1471]: time="2024-07-02T01:55:35.606869163Z" level=info msg="StartContainer for \"031609ea9c504c3c3df14fffe537d6e892836ca4b409c0fdceef0ceacec54388\" returns successfully" Jul 2 01:55:35.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.623000 audit: BPF prog-id=214 op=LOAD Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { bpf } for pid=6173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2321 pid=6173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:35.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664633664343665396165373035373463343263643164303234653837 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { perfmon } for pid=6173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2321 pid=6173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:35.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664633664343665396165373035373463343263643164303234653837 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { bpf } for pid=6173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { bpf } for pid=6173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { bpf } for pid=6173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { perfmon } for pid=6173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { perfmon } for pid=6173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { perfmon } for pid=6173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { perfmon } for pid=6173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { perfmon } for pid=6173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { bpf } for pid=6173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { bpf } for pid=6173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit: BPF prog-id=215 op=LOAD Jul 2 01:55:35.624000 audit[6173]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2321 pid=6173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:35.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664633664343665396165373035373463343263643164303234653837 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { bpf } for pid=6173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { bpf } for pid=6173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { perfmon } for pid=6173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { perfmon } for pid=6173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { perfmon } for pid=6173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { perfmon } for pid=6173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { perfmon } for pid=6173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { bpf } for pid=6173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { bpf } for pid=6173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit: BPF prog-id=216 op=LOAD Jul 2 01:55:35.624000 audit[6173]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2321 pid=6173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:35.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664633664343665396165373035373463343263643164303234653837 Jul 2 01:55:35.624000 audit: BPF prog-id=216 op=UNLOAD Jul 2 01:55:35.624000 audit: BPF prog-id=215 op=UNLOAD Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { bpf } for pid=6173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { bpf } for pid=6173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { bpf } for pid=6173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { perfmon } for pid=6173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { perfmon } for pid=6173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { perfmon } for pid=6173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { perfmon } for pid=6173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { perfmon } for pid=6173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { bpf } for pid=6173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit[6173]: AVC avc: denied { bpf } for pid=6173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:55:35.624000 audit: BPF prog-id=217 op=LOAD Jul 2 01:55:35.624000 audit[6173]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2321 pid=6173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:55:35.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664633664343665396165373035373463343263643164303234653837 Jul 2 01:55:35.634100 env[1471]: time="2024-07-02T01:55:35.634058896Z" level=info msg="StartContainer for \"c5e0de5790309721610f7014edf4b641c9833ea15188b4ab59a1803f06271d8c\" returns successfully" Jul 2 01:55:35.655104 env[1471]: time="2024-07-02T01:55:35.655059634Z" level=info msg="StartContainer for \"6dc6d46e9ae70574c42cd1d024e87cfb6dd70901d60777437bd1d8a155e2bc77\" returns successfully" Jul 2 01:55:37.887000 audit[6192]: AVC avc: denied { watch } for pid=6192 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:37.892649 kernel: kauditd_printk_skb: 173 callbacks suppressed Jul 2 01:55:37.892723 kernel: audit: type=1400 audit(1719885337.887:1626): avc: denied { watch } for pid=6192 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521033 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:37.887000 audit[6192]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000486090 a2=fc6 a3=0 items=0 ppid=2321 pid=6192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:55:37.944342 kernel: audit: type=1300 audit(1719885337.887:1626): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000486090 a2=fc6 a3=0 items=0 ppid=2321 pid=6192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:55:37.887000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:37.969344 kernel: audit: type=1327 audit(1719885337.887:1626): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:37.887000 audit[6192]: AVC avc: denied { watch } for pid=6192 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:37.992592 kernel: audit: type=1400 audit(1719885337.887:1627): avc: denied { watch } for pid=6192 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521027 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 01:55:37.887000 audit[6192]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000054200 a2=fc6 a3=0 items=0 ppid=2321 pid=6192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:55:38.020625 kernel: audit: type=1300 audit(1719885337.887:1627): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000054200 a2=fc6 a3=0 items=0 ppid=2321 pid=6192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c896 key=(null) Jul 2 01:55:38.020732 kernel: audit: type=1327 audit(1719885337.887:1627): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:37.887000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 01:55:40.158635 kubelet[2592]: E0702 01:55:40.158507 2592 event.go:359] "Server rejected event (will not retry!)" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.43:53076->10.200.20.31:2379: read: connection timed out" event="&Event{ObjectMeta:{kube-apiserver-ci-3510.3.5-a-118aa0dcdb.17de42985202a20f kube-system 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:kube-system,Name:kube-apiserver-ci-3510.3.5-a-118aa0dcdb,UID:7b14b2c3f73ddd0d3aa5591cb3304dc6,APIVersion:v1,ResourceVersion:,FieldPath:spec.containers{kube-apiserver},},Reason:Unhealthy,Message:Readiness probe failed: HTTP probe failed with statuscode: 500,Source:EventSource{Component:kubelet,Host:ci-3510.3.5-a-118aa0dcdb,},FirstTimestamp:2024-07-02 01:55:29.680474639 +0000 UTC m=+244.957043338,LastTimestamp:2024-07-02 01:55:29.680474639 +0000 UTC m=+244.957043338,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.5-a-118aa0dcdb,}" Jul 2 01:55:40.593972 systemd[1]: run-containerd-runc-k8s.io-a89b44eb3a285f58cd79831b28528b64b7cf78c02a7c1423c2a558436f1b0182-runc.aJ12Fy.mount: Deactivated successfully. Jul 2 01:55:42.977370 systemd[1]: cri-containerd-c5e0de5790309721610f7014edf4b641c9833ea15188b4ab59a1803f06271d8c.scope: Deactivated successfully. Jul 2 01:55:42.976000 audit: BPF prog-id=210 op=UNLOAD Jul 2 01:55:42.984508 kernel: audit: type=1334 audit(1719885342.976:1628): prog-id=210 op=UNLOAD Jul 2 01:55:42.983000 audit: BPF prog-id=213 op=UNLOAD Jul 2 01:55:42.992485 kernel: audit: type=1334 audit(1719885342.983:1629): prog-id=213 op=UNLOAD Jul 2 01:55:43.005974 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c5e0de5790309721610f7014edf4b641c9833ea15188b4ab59a1803f06271d8c-rootfs.mount: Deactivated successfully. Jul 2 01:55:43.055076 env[1471]: time="2024-07-02T01:55:43.055027847Z" level=info msg="shim disconnected" id=c5e0de5790309721610f7014edf4b641c9833ea15188b4ab59a1803f06271d8c Jul 2 01:55:43.055076 env[1471]: time="2024-07-02T01:55:43.055073729Z" level=warning msg="cleaning up after shim disconnected" id=c5e0de5790309721610f7014edf4b641c9833ea15188b4ab59a1803f06271d8c namespace=k8s.io Jul 2 01:55:43.055547 env[1471]: time="2024-07-02T01:55:43.055084049Z" level=info msg="cleaning up dead shim" Jul 2 01:55:43.062305 env[1471]: time="2024-07-02T01:55:43.062258726Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:55:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6256 runtime=io.containerd.runc.v2\n" Jul 2 01:55:43.471429 kubelet[2592]: I0702 01:55:43.470851 2592 scope.go:117] "RemoveContainer" containerID="5b394df8f756b7cd1db9651ce5f7510eed2cd296a4eab6c50599268a56e83cdc" Jul 2 01:55:43.471429 kubelet[2592]: I0702 01:55:43.471164 2592 scope.go:117] "RemoveContainer" containerID="c5e0de5790309721610f7014edf4b641c9833ea15188b4ab59a1803f06271d8c" Jul 2 01:55:43.471429 kubelet[2592]: E0702 01:55:43.471369 2592 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-76ff79f7fd-wsh7t_tigera-operator(d0413f3b-5939-4de3-821f-f931c4f00988)\"" pod="tigera-operator/tigera-operator-76ff79f7fd-wsh7t" podUID="d0413f3b-5939-4de3-821f-f931c4f00988" Jul 2 01:55:43.472717 env[1471]: time="2024-07-02T01:55:43.472624447Z" level=info msg="RemoveContainer for \"5b394df8f756b7cd1db9651ce5f7510eed2cd296a4eab6c50599268a56e83cdc\"" Jul 2 01:55:43.488172 env[1471]: time="2024-07-02T01:55:43.488132332Z" level=info msg="RemoveContainer for \"5b394df8f756b7cd1db9651ce5f7510eed2cd296a4eab6c50599268a56e83cdc\" returns successfully" Jul 2 01:55:45.298497 kubelet[2592]: E0702 01:55:45.298250 2592 controller.go:195] "Failed to update lease" err="Put \"https://10.200.20.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-118aa0dcdb?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 2 01:55:45.918546 kubelet[2592]: I0702 01:55:45.918500 2592 status_manager.go:853] "Failed to get status for pod" podUID="e2cbbebbcd2963d9d3b7119223865864" pod="kube-system/kube-scheduler-ci-3510.3.5-a-118aa0dcdb" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.43:53216->10.200.20.31:2379: read: connection timed out" Jul 2 01:55:55.299323 kubelet[2592]: E0702 01:55:55.299273 2592 controller.go:195] "Failed to update lease" err="Put \"https://10.200.20.43:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-118aa0dcdb?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"