Feb 9 19:15:40.100497 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 19:15:40.100540 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:15:40.100558 kernel: BIOS-provided physical RAM map: Feb 9 19:15:40.100572 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Feb 9 19:15:40.100585 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Feb 9 19:15:40.100598 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Feb 9 19:15:40.100617 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Feb 9 19:15:40.100632 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Feb 9 19:15:40.100646 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Feb 9 19:15:40.100660 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Feb 9 19:15:40.100673 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Feb 9 19:15:40.100685 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Feb 9 19:15:40.100698 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Feb 9 19:15:40.100710 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Feb 9 19:15:40.100731 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Feb 9 19:15:40.100747 kernel: NX (Execute Disable) protection: active Feb 9 19:15:40.100762 kernel: efi: EFI v2.70 by EDK II Feb 9 19:15:40.100777 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe379198 RNG=0xbfb73018 TPMEventLog=0xbe2bd018 Feb 9 19:15:40.100792 kernel: random: crng init done Feb 9 19:15:40.100807 kernel: SMBIOS 2.4 present. Feb 9 19:15:40.100823 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 Feb 9 19:15:40.100838 kernel: Hypervisor detected: KVM Feb 9 19:15:40.100856 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 19:15:40.100871 kernel: kvm-clock: cpu 0, msr 1f9faa001, primary cpu clock Feb 9 19:15:40.100886 kernel: kvm-clock: using sched offset of 12850414832 cycles Feb 9 19:15:40.100901 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 19:15:40.100917 kernel: tsc: Detected 2299.998 MHz processor Feb 9 19:15:40.100952 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 19:15:40.100968 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 19:15:40.100983 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Feb 9 19:15:40.100999 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 19:15:40.101014 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Feb 9 19:15:40.101034 kernel: Using GB pages for direct mapping Feb 9 19:15:40.101049 kernel: Secure boot disabled Feb 9 19:15:40.101064 kernel: ACPI: Early table checksum verification disabled Feb 9 19:15:40.101078 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Feb 9 19:15:40.101091 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Feb 9 19:15:40.101105 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Feb 9 19:15:40.101120 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Feb 9 19:15:40.101136 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Feb 9 19:15:40.101162 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Feb 9 19:15:40.101179 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Feb 9 19:15:40.101195 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Feb 9 19:15:40.101212 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Feb 9 19:15:40.101229 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Feb 9 19:15:40.101253 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Feb 9 19:15:40.101273 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Feb 9 19:15:40.101289 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Feb 9 19:15:40.101305 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Feb 9 19:15:40.101321 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Feb 9 19:15:40.101338 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Feb 9 19:15:40.101361 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Feb 9 19:15:40.101377 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Feb 9 19:15:40.101394 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Feb 9 19:15:40.101410 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Feb 9 19:15:40.101429 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 9 19:15:40.101443 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 9 19:15:40.101458 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 9 19:15:40.101474 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Feb 9 19:15:40.101490 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Feb 9 19:15:40.101507 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Feb 9 19:15:40.101524 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Feb 9 19:15:40.101540 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Feb 9 19:15:40.101557 kernel: Zone ranges: Feb 9 19:15:40.101578 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 19:15:40.101595 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 19:15:40.101612 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Feb 9 19:15:40.101628 kernel: Movable zone start for each node Feb 9 19:15:40.101644 kernel: Early memory node ranges Feb 9 19:15:40.101661 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Feb 9 19:15:40.101677 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Feb 9 19:15:40.101693 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Feb 9 19:15:40.101709 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Feb 9 19:15:40.101730 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Feb 9 19:15:40.101746 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Feb 9 19:15:40.101763 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:15:40.101779 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Feb 9 19:15:40.101796 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Feb 9 19:15:40.101812 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Feb 9 19:15:40.101828 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Feb 9 19:15:40.101845 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 9 19:15:40.101860 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 19:15:40.101879 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 19:15:40.101895 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 19:15:40.101910 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 19:15:40.101960 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 19:15:40.101978 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 19:15:40.101995 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 19:15:40.102011 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 19:15:40.102028 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Feb 9 19:15:40.102044 kernel: Booting paravirtualized kernel on KVM Feb 9 19:15:40.102066 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 19:15:40.102083 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 19:15:40.102099 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 19:15:40.102115 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 19:15:40.102131 kernel: pcpu-alloc: [0] 0 1 Feb 9 19:15:40.102147 kernel: kvm-guest: PV spinlocks enabled Feb 9 19:15:40.102164 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 19:15:40.102180 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Feb 9 19:15:40.102197 kernel: Policy zone: Normal Feb 9 19:15:40.102219 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:15:40.102236 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:15:40.102252 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 9 19:15:40.102269 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 19:15:40.102286 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:15:40.102302 kernel: Memory: 7536516K/7860584K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 323808K reserved, 0K cma-reserved) Feb 9 19:15:40.102319 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 19:15:40.102335 kernel: Kernel/User page tables isolation: enabled Feb 9 19:15:40.102363 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 19:15:40.102379 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 19:15:40.102396 kernel: rcu: Hierarchical RCU implementation. Feb 9 19:15:40.102413 kernel: rcu: RCU event tracing is enabled. Feb 9 19:15:40.102430 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 19:15:40.102447 kernel: Rude variant of Tasks RCU enabled. Feb 9 19:15:40.102464 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:15:40.102481 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:15:40.102497 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 19:15:40.102519 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 9 19:15:40.102549 kernel: Console: colour dummy device 80x25 Feb 9 19:15:40.102566 kernel: printk: console [ttyS0] enabled Feb 9 19:15:40.102587 kernel: ACPI: Core revision 20210730 Feb 9 19:15:40.102605 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 19:15:40.102622 kernel: x2apic enabled Feb 9 19:15:40.102640 kernel: Switched APIC routing to physical x2apic. Feb 9 19:15:40.102657 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Feb 9 19:15:40.102675 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 9 19:15:40.102693 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Feb 9 19:15:40.102714 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Feb 9 19:15:40.102731 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Feb 9 19:15:40.102749 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 19:15:40.102766 kernel: Spectre V2 : Mitigation: IBRS Feb 9 19:15:40.102783 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 19:15:40.102801 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 19:15:40.102823 kernel: RETBleed: Mitigation: IBRS Feb 9 19:15:40.102840 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 19:15:40.102858 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Feb 9 19:15:40.102875 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 19:15:40.102893 kernel: MDS: Mitigation: Clear CPU buffers Feb 9 19:15:40.102910 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 19:15:40.102939 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 19:15:40.102957 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 19:15:40.102975 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 19:15:40.102997 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 19:15:40.103015 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 9 19:15:40.103032 kernel: Freeing SMP alternatives memory: 32K Feb 9 19:15:40.103049 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:15:40.103066 kernel: LSM: Security Framework initializing Feb 9 19:15:40.103083 kernel: SELinux: Initializing. Feb 9 19:15:40.103100 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:15:40.103118 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:15:40.103160 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Feb 9 19:15:40.103185 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Feb 9 19:15:40.103203 kernel: signal: max sigframe size: 1776 Feb 9 19:15:40.103221 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:15:40.103239 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 9 19:15:40.103256 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:15:40.103273 kernel: x86: Booting SMP configuration: Feb 9 19:15:40.103296 kernel: .... node #0, CPUs: #1 Feb 9 19:15:40.103313 kernel: kvm-clock: cpu 1, msr 1f9faa041, secondary cpu clock Feb 9 19:15:40.103331 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 9 19:15:40.103360 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 19:15:40.103377 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 19:15:40.103395 kernel: smpboot: Max logical packages: 1 Feb 9 19:15:40.103413 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Feb 9 19:15:40.103431 kernel: devtmpfs: initialized Feb 9 19:15:40.103446 kernel: x86/mm: Memory block size: 128MB Feb 9 19:15:40.103464 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Feb 9 19:15:40.103482 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:15:40.103498 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 19:15:40.103520 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:15:40.103538 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:15:40.103556 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:15:40.103574 kernel: audit: type=2000 audit(1707506138.745:1): state=initialized audit_enabled=0 res=1 Feb 9 19:15:40.103592 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:15:40.103609 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 19:15:40.103625 kernel: cpuidle: using governor menu Feb 9 19:15:40.103643 kernel: ACPI: bus type PCI registered Feb 9 19:15:40.103660 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:15:40.103682 kernel: dca service started, version 1.12.1 Feb 9 19:15:40.103700 kernel: PCI: Using configuration type 1 for base access Feb 9 19:15:40.103718 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 19:15:40.103735 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 19:15:40.103753 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:15:40.103770 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:15:40.103787 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:15:40.103805 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:15:40.103823 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:15:40.103844 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:15:40.103860 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:15:40.103878 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:15:40.103895 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 9 19:15:40.103914 kernel: ACPI: Interpreter enabled Feb 9 19:15:40.103952 kernel: ACPI: PM: (supports S0 S3 S5) Feb 9 19:15:40.103969 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 19:15:40.103987 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 19:15:40.104005 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 9 19:15:40.104027 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 19:15:40.104265 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 9 19:15:40.104440 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 9 19:15:40.104463 kernel: PCI host bridge to bus 0000:00 Feb 9 19:15:40.104612 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 19:15:40.104750 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 19:15:40.104893 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 19:15:40.117461 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Feb 9 19:15:40.117677 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 19:15:40.117871 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 19:15:40.118074 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Feb 9 19:15:40.118248 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 19:15:40.118421 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 9 19:15:40.118597 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Feb 9 19:15:40.118754 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Feb 9 19:15:40.118958 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Feb 9 19:15:40.119154 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Feb 9 19:15:40.119318 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Feb 9 19:15:40.119493 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Feb 9 19:15:40.119670 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 19:15:40.119836 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Feb 9 19:15:40.120014 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Feb 9 19:15:40.120033 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 19:15:40.120049 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 19:15:40.120065 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 19:15:40.120079 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 19:15:40.120096 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 19:15:40.120116 kernel: iommu: Default domain type: Translated Feb 9 19:15:40.120132 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 19:15:40.120149 kernel: vgaarb: loaded Feb 9 19:15:40.120164 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:15:40.120180 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:15:40.120196 kernel: PTP clock support registered Feb 9 19:15:40.120212 kernel: Registered efivars operations Feb 9 19:15:40.120229 kernel: PCI: Using ACPI for IRQ routing Feb 9 19:15:40.120244 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 19:15:40.120264 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Feb 9 19:15:40.120283 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Feb 9 19:15:40.120300 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Feb 9 19:15:40.120317 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Feb 9 19:15:40.120334 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 19:15:40.120360 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:15:40.120379 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:15:40.120393 kernel: pnp: PnP ACPI init Feb 9 19:15:40.120409 kernel: pnp: PnP ACPI: found 7 devices Feb 9 19:15:40.120428 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 19:15:40.120444 kernel: NET: Registered PF_INET protocol family Feb 9 19:15:40.120460 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 19:15:40.120479 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 9 19:15:40.120496 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:15:40.120512 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 19:15:40.120529 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 19:15:40.120547 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 9 19:15:40.120564 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:15:40.120587 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:15:40.120603 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:15:40.120621 kernel: NET: Registered PF_XDP protocol family Feb 9 19:15:40.120800 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 19:15:40.120997 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 19:15:40.121175 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 19:15:40.121391 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Feb 9 19:15:40.121564 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 19:15:40.121594 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:15:40.121613 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 19:15:40.121631 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Feb 9 19:15:40.121648 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 9 19:15:40.121666 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 9 19:15:40.121684 kernel: clocksource: Switched to clocksource tsc Feb 9 19:15:40.121702 kernel: Initialise system trusted keyrings Feb 9 19:15:40.121719 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 9 19:15:40.121739 kernel: Key type asymmetric registered Feb 9 19:15:40.121756 kernel: Asymmetric key parser 'x509' registered Feb 9 19:15:40.121773 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:15:40.121790 kernel: io scheduler mq-deadline registered Feb 9 19:15:40.121808 kernel: io scheduler kyber registered Feb 9 19:15:40.121825 kernel: io scheduler bfq registered Feb 9 19:15:40.121842 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 19:15:40.121870 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 19:15:40.122069 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Feb 9 19:15:40.122097 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 9 19:15:40.122260 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Feb 9 19:15:40.122283 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 19:15:40.122442 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Feb 9 19:15:40.122462 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:15:40.122479 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 19:15:40.122496 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 19:15:40.122512 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Feb 9 19:15:40.122528 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Feb 9 19:15:40.122687 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Feb 9 19:15:40.122709 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 19:15:40.122726 kernel: i8042: Warning: Keylock active Feb 9 19:15:40.122742 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 19:15:40.122757 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 19:15:40.122911 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 9 19:15:40.123073 kernel: rtc_cmos 00:00: registered as rtc0 Feb 9 19:15:40.123213 kernel: rtc_cmos 00:00: setting system clock to 2024-02-09T19:15:39 UTC (1707506139) Feb 9 19:15:40.123350 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 9 19:15:40.123371 kernel: intel_pstate: CPU model not supported Feb 9 19:15:40.123388 kernel: pstore: Registered efi as persistent store backend Feb 9 19:15:40.123423 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:15:40.123439 kernel: Segment Routing with IPv6 Feb 9 19:15:40.123454 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:15:40.123471 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:15:40.123486 kernel: Key type dns_resolver registered Feb 9 19:15:40.123552 kernel: IPI shorthand broadcast: enabled Feb 9 19:15:40.123569 kernel: sched_clock: Marking stable (745593805, 138391183)->(921336474, -37351486) Feb 9 19:15:40.123587 kernel: registered taskstats version 1 Feb 9 19:15:40.123604 kernel: Loading compiled-in X.509 certificates Feb 9 19:15:40.123622 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 19:15:40.123639 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 19:15:40.123656 kernel: Key type .fscrypt registered Feb 9 19:15:40.123673 kernel: Key type fscrypt-provisioning registered Feb 9 19:15:40.123691 kernel: pstore: Using crash dump compression: deflate Feb 9 19:15:40.123712 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:15:40.123729 kernel: ima: No architecture policies found Feb 9 19:15:40.123746 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 19:15:40.123764 kernel: Write protecting the kernel read-only data: 28672k Feb 9 19:15:40.123781 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 19:15:40.123799 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 19:15:40.123816 kernel: Run /init as init process Feb 9 19:15:40.123833 kernel: with arguments: Feb 9 19:15:40.123861 kernel: /init Feb 9 19:15:40.123878 kernel: with environment: Feb 9 19:15:40.123895 kernel: HOME=/ Feb 9 19:15:40.123911 kernel: TERM=linux Feb 9 19:15:40.123939 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:15:40.123971 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:15:40.123992 systemd[1]: Detected virtualization kvm. Feb 9 19:15:40.124010 systemd[1]: Detected architecture x86-64. Feb 9 19:15:40.124031 systemd[1]: Running in initrd. Feb 9 19:15:40.124048 systemd[1]: No hostname configured, using default hostname. Feb 9 19:15:40.124065 systemd[1]: Hostname set to . Feb 9 19:15:40.124083 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:15:40.124100 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:15:40.124116 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:15:40.124133 systemd[1]: Reached target cryptsetup.target. Feb 9 19:15:40.124150 systemd[1]: Reached target paths.target. Feb 9 19:15:40.124170 systemd[1]: Reached target slices.target. Feb 9 19:15:40.124186 systemd[1]: Reached target swap.target. Feb 9 19:15:40.124203 systemd[1]: Reached target timers.target. Feb 9 19:15:40.124221 systemd[1]: Listening on iscsid.socket. Feb 9 19:15:40.124238 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:15:40.124255 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:15:40.124273 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:15:40.124293 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:15:40.124310 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:15:40.124327 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:15:40.124344 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:15:40.124362 systemd[1]: Reached target sockets.target. Feb 9 19:15:40.124378 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:15:40.124396 systemd[1]: Finished network-cleanup.service. Feb 9 19:15:40.124413 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:15:40.124429 systemd[1]: Starting systemd-journald.service... Feb 9 19:15:40.124450 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:15:40.124467 systemd[1]: Starting systemd-resolved.service... Feb 9 19:15:40.124484 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:15:40.124527 systemd-journald[189]: Journal started Feb 9 19:15:40.124617 systemd-journald[189]: Runtime Journal (/run/log/journal/8a3e26f21d0fabc584150e88200417fd) is 8.0M, max 148.8M, 140.8M free. Feb 9 19:15:40.121392 systemd-modules-load[190]: Inserted module 'overlay' Feb 9 19:15:40.131068 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:15:40.138685 kernel: audit: type=1130 audit(1707506140.131:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.138760 systemd[1]: Started systemd-journald.service. Feb 9 19:15:40.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.158710 kernel: audit: type=1130 audit(1707506140.152:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.158494 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:15:40.174235 kernel: audit: type=1130 audit(1707506140.161:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.174397 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:15:40.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.163317 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:15:40.172950 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:15:40.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.178309 systemd-resolved[191]: Positive Trust Anchors: Feb 9 19:15:40.183248 kernel: audit: type=1130 audit(1707506140.170:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.178322 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:15:40.178381 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:15:40.180961 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:15:40.187568 systemd-resolved[191]: Defaulting to hostname 'linux'. Feb 9 19:15:40.192843 systemd[1]: Started systemd-resolved.service. Feb 9 19:15:40.195399 systemd-modules-load[190]: Inserted module 'br_netfilter' Feb 9 19:15:40.196036 kernel: Bridge firewalling registered Feb 9 19:15:40.196271 systemd[1]: Reached target nss-lookup.target. Feb 9 19:15:40.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.202997 kernel: audit: type=1130 audit(1707506140.193:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.214245 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:15:40.218090 kernel: audit: type=1130 audit(1707506140.212:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.221328 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:15:40.231159 kernel: audit: type=1130 audit(1707506140.223:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.231208 kernel: SCSI subsystem initialized Feb 9 19:15:40.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.226451 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:15:40.246358 dracut-cmdline[206]: dracut-dracut-053 Feb 9 19:15:40.254437 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:15:40.254475 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:15:40.254500 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:15:40.254522 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:15:40.257838 systemd-modules-load[190]: Inserted module 'dm_multipath' Feb 9 19:15:40.260297 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:15:40.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.279292 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:15:40.284815 kernel: audit: type=1130 audit(1707506140.276:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.295599 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:15:40.305086 kernel: audit: type=1130 audit(1707506140.293:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.340970 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:15:40.353980 kernel: iscsi: registered transport (tcp) Feb 9 19:15:40.378761 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:15:40.378850 kernel: QLogic iSCSI HBA Driver Feb 9 19:15:40.423337 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:15:40.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.428504 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:15:40.487027 kernel: raid6: avx2x4 gen() 18002 MB/s Feb 9 19:15:40.504978 kernel: raid6: avx2x4 xor() 8117 MB/s Feb 9 19:15:40.522985 kernel: raid6: avx2x2 gen() 18243 MB/s Feb 9 19:15:40.541008 kernel: raid6: avx2x2 xor() 18555 MB/s Feb 9 19:15:40.557977 kernel: raid6: avx2x1 gen() 14109 MB/s Feb 9 19:15:40.574958 kernel: raid6: avx2x1 xor() 16209 MB/s Feb 9 19:15:40.591957 kernel: raid6: sse2x4 gen() 11088 MB/s Feb 9 19:15:40.608965 kernel: raid6: sse2x4 xor() 6669 MB/s Feb 9 19:15:40.625962 kernel: raid6: sse2x2 gen() 12055 MB/s Feb 9 19:15:40.642965 kernel: raid6: sse2x2 xor() 7454 MB/s Feb 9 19:15:40.659964 kernel: raid6: sse2x1 gen() 10580 MB/s Feb 9 19:15:40.677637 kernel: raid6: sse2x1 xor() 5208 MB/s Feb 9 19:15:40.677682 kernel: raid6: using algorithm avx2x2 gen() 18243 MB/s Feb 9 19:15:40.677703 kernel: raid6: .... xor() 18555 MB/s, rmw enabled Feb 9 19:15:40.678382 kernel: raid6: using avx2x2 recovery algorithm Feb 9 19:15:40.693975 kernel: xor: automatically using best checksumming function avx Feb 9 19:15:40.799971 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 19:15:40.811676 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:15:40.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.810000 audit: BPF prog-id=7 op=LOAD Feb 9 19:15:40.810000 audit: BPF prog-id=8 op=LOAD Feb 9 19:15:40.813113 systemd[1]: Starting systemd-udevd.service... Feb 9 19:15:40.830058 systemd-udevd[388]: Using default interface naming scheme 'v252'. Feb 9 19:15:40.837458 systemd[1]: Started systemd-udevd.service. Feb 9 19:15:40.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.842332 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:15:40.864030 dracut-pre-trigger[399]: rd.md=0: removing MD RAID activation Feb 9 19:15:40.903225 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:15:40.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:40.909138 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:15:40.972364 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:15:40.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:41.037963 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 19:15:41.087407 kernel: scsi host0: Virtio SCSI HBA Feb 9 19:15:41.094407 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Feb 9 19:15:41.094494 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 19:15:41.103697 kernel: AES CTR mode by8 optimization enabled Feb 9 19:15:41.186621 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Feb 9 19:15:41.186880 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Feb 9 19:15:41.189705 kernel: sd 0:0:1:0: [sda] Write Protect is off Feb 9 19:15:41.190032 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Feb 9 19:15:41.190370 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 19:15:41.200602 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 19:15:41.200675 kernel: GPT:17805311 != 25165823 Feb 9 19:15:41.200697 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 19:15:41.200729 kernel: GPT:17805311 != 25165823 Feb 9 19:15:41.201292 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 19:15:41.202813 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:15:41.205956 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Feb 9 19:15:41.265491 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:15:41.284268 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (450) Feb 9 19:15:41.280806 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:15:41.298252 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:15:41.314130 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:15:41.340105 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:15:41.355267 systemd[1]: Starting disk-uuid.service... Feb 9 19:15:41.381772 disk-uuid[516]: Primary Header is updated. Feb 9 19:15:41.381772 disk-uuid[516]: Secondary Entries is updated. Feb 9 19:15:41.381772 disk-uuid[516]: Secondary Header is updated. Feb 9 19:15:41.408099 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:15:41.408132 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:15:41.427967 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:15:42.418954 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:15:42.419358 disk-uuid[517]: The operation has completed successfully. Feb 9 19:15:42.485577 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:15:42.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:42.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:42.485721 systemd[1]: Finished disk-uuid.service. Feb 9 19:15:42.496087 systemd[1]: Starting verity-setup.service... Feb 9 19:15:42.524073 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 19:15:42.599108 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:15:42.601530 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:15:42.627585 systemd[1]: Finished verity-setup.service. Feb 9 19:15:42.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:42.704979 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:15:42.705239 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:15:42.712289 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:15:42.759098 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:15:42.759140 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:15:42.759164 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:15:42.713193 systemd[1]: Starting ignition-setup.service... Feb 9 19:15:42.781553 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:15:42.728259 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:15:42.791286 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:15:42.806523 systemd[1]: Finished ignition-setup.service. Feb 9 19:15:42.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:42.808111 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:15:42.845866 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:15:42.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:42.845000 audit: BPF prog-id=9 op=LOAD Feb 9 19:15:42.847916 systemd[1]: Starting systemd-networkd.service... Feb 9 19:15:42.878990 systemd-networkd[691]: lo: Link UP Feb 9 19:15:42.879002 systemd-networkd[691]: lo: Gained carrier Feb 9 19:15:42.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:42.879806 systemd-networkd[691]: Enumeration completed Feb 9 19:15:42.879976 systemd[1]: Started systemd-networkd.service. Feb 9 19:15:42.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:42.880395 systemd-networkd[691]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:15:42.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:42.882709 systemd-networkd[691]: eth0: Link UP Feb 9 19:15:42.979316 iscsid[697]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:15:42.979316 iscsid[697]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 19:15:42.979316 iscsid[697]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:15:42.979316 iscsid[697]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:15:42.979316 iscsid[697]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:15:42.979316 iscsid[697]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:15:42.979316 iscsid[697]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:15:42.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:43.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:43.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:42.882716 systemd-networkd[691]: eth0: Gained carrier Feb 9 19:15:43.087496 ignition[657]: Ignition 2.14.0 Feb 9 19:15:42.886371 systemd[1]: Reached target network.target. Feb 9 19:15:43.087511 ignition[657]: Stage: fetch-offline Feb 9 19:15:42.892065 systemd-networkd[691]: eth0: DHCPv4 address 10.128.0.97/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 9 19:15:43.087593 ignition[657]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:15:42.908058 systemd[1]: Starting iscsiuio.service... Feb 9 19:15:43.087634 ignition[657]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:15:42.917953 systemd[1]: Started iscsiuio.service. Feb 9 19:15:43.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:43.108909 ignition[657]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:15:42.930423 systemd[1]: Starting iscsid.service... Feb 9 19:15:43.109260 ignition[657]: parsed url from cmdline: "" Feb 9 19:15:42.944215 systemd[1]: Started iscsid.service. Feb 9 19:15:43.109266 ignition[657]: no config URL provided Feb 9 19:15:42.953502 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:15:43.109273 ignition[657]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:15:43.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:42.971168 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:15:43.109285 ignition[657]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:15:42.988349 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:15:43.109295 ignition[657]: failed to fetch config: resource requires networking Feb 9 19:15:43.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:42.997083 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:15:43.109446 ignition[657]: Ignition finished successfully Feb 9 19:15:43.005063 systemd[1]: Reached target remote-fs.target. Feb 9 19:15:43.128421 ignition[716]: Ignition 2.14.0 Feb 9 19:15:43.014350 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:15:43.128430 ignition[716]: Stage: fetch Feb 9 19:15:43.050509 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:15:43.128553 ignition[716]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:15:43.110546 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:15:43.128582 ignition[716]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:15:43.117358 systemd[1]: Starting ignition-fetch.service... Feb 9 19:15:43.135837 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:15:43.190033 unknown[716]: fetched base config from "system" Feb 9 19:15:43.136046 ignition[716]: parsed url from cmdline: "" Feb 9 19:15:43.190045 unknown[716]: fetched base config from "system" Feb 9 19:15:43.136053 ignition[716]: no config URL provided Feb 9 19:15:43.190054 unknown[716]: fetched user config from "gcp" Feb 9 19:15:43.136060 ignition[716]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:15:43.192641 systemd[1]: Finished ignition-fetch.service. Feb 9 19:15:43.136072 ignition[716]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:15:43.208520 systemd[1]: Starting ignition-kargs.service... Feb 9 19:15:43.136106 ignition[716]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Feb 9 19:15:43.249624 systemd[1]: Finished ignition-kargs.service. Feb 9 19:15:43.144763 ignition[716]: GET result: OK Feb 9 19:15:43.258544 systemd[1]: Starting ignition-disks.service... Feb 9 19:15:43.144889 ignition[716]: parsing config with SHA512: ad8e214f2e16e7ab6dfa8d3c59d57c81aef451588a220e6788246c24745a3f6cceb49c6524b1d8245fd0abb16e150aa72db1301648af6145f52ad660b751ad8e Feb 9 19:15:43.293427 systemd[1]: Finished ignition-disks.service. Feb 9 19:15:43.190886 ignition[716]: fetch: fetch complete Feb 9 19:15:43.309346 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:15:43.190893 ignition[716]: fetch: fetch passed Feb 9 19:15:43.327099 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:15:43.190960 ignition[716]: Ignition finished successfully Feb 9 19:15:43.327194 systemd[1]: Reached target local-fs.target. Feb 9 19:15:43.221888 ignition[722]: Ignition 2.14.0 Feb 9 19:15:43.349115 systemd[1]: Reached target sysinit.target. Feb 9 19:15:43.221897 ignition[722]: Stage: kargs Feb 9 19:15:43.349231 systemd[1]: Reached target basic.target. Feb 9 19:15:43.222063 ignition[722]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:15:43.370420 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:15:43.222094 ignition[722]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:15:43.230275 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:15:43.233443 ignition[722]: kargs: kargs passed Feb 9 19:15:43.233496 ignition[722]: Ignition finished successfully Feb 9 19:15:43.270452 ignition[728]: Ignition 2.14.0 Feb 9 19:15:43.270461 ignition[728]: Stage: disks Feb 9 19:15:43.270592 ignition[728]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:15:43.270622 ignition[728]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:15:43.277587 ignition[728]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:15:43.279129 ignition[728]: disks: disks passed Feb 9 19:15:43.279194 ignition[728]: Ignition finished successfully Feb 9 19:15:43.414300 systemd-fsck[736]: ROOT: clean, 602/1628000 files, 124051/1617920 blocks Feb 9 19:15:43.631913 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:15:43.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:43.641295 systemd[1]: Mounting sysroot.mount... Feb 9 19:15:43.670124 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:15:43.666397 systemd[1]: Mounted sysroot.mount. Feb 9 19:15:43.677431 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:15:43.698054 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:15:43.715639 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 19:15:43.715726 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:15:43.715773 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:15:43.736666 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:15:43.768141 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:15:43.787950 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (742) Feb 9 19:15:43.804003 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:15:43.804078 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:15:43.810849 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:15:43.815154 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:15:43.841105 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:15:43.835811 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:15:43.857256 initrd-setup-root[765]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:15:43.867127 initrd-setup-root[773]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:15:43.877089 initrd-setup-root[781]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:15:43.887076 initrd-setup-root[789]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:15:43.924617 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:15:43.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:43.925830 systemd[1]: Starting ignition-mount.service... Feb 9 19:15:43.947244 systemd[1]: Starting sysroot-boot.service... Feb 9 19:15:43.961455 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 19:15:43.961618 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 19:15:43.989070 ignition[808]: INFO : Ignition 2.14.0 Feb 9 19:15:43.989070 ignition[808]: INFO : Stage: mount Feb 9 19:15:43.989070 ignition[808]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:15:43.989070 ignition[808]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:15:44.080090 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (817) Feb 9 19:15:44.080134 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:15:44.080158 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:15:44.080181 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:15:43.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:44.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:15:43.968040 systemd-networkd[691]: eth0: Gained IPv6LL Feb 9 19:15:44.100209 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:15:44.100309 ignition[808]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:15:44.100309 ignition[808]: INFO : mount: mount passed Feb 9 19:15:44.100309 ignition[808]: INFO : Ignition finished successfully Feb 9 19:15:43.989793 systemd[1]: Finished sysroot-boot.service. Feb 9 19:15:43.997660 systemd[1]: Finished ignition-mount.service. Feb 9 19:15:44.011308 systemd[1]: Starting ignition-files.service... Feb 9 19:15:44.153140 ignition[836]: INFO : Ignition 2.14.0 Feb 9 19:15:44.153140 ignition[836]: INFO : Stage: files Feb 9 19:15:44.153140 ignition[836]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:15:44.153140 ignition[836]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:15:44.153140 ignition[836]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:15:44.153140 ignition[836]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:15:44.153140 ignition[836]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:15:44.153140 ignition[836]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:15:44.153140 ignition[836]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:15:44.153140 ignition[836]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:15:44.153140 ignition[836]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:15:44.031230 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:15:44.289097 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:15:44.289097 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 19:15:44.095950 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:15:44.152616 unknown[836]: wrote ssh authorized keys file for user: core Feb 9 19:15:44.478412 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 19:15:44.749392 ignition[836]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 19:15:44.773094 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:15:44.773094 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:15:44.773094 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 19:15:44.872412 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 19:15:44.983318 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:15:45.011078 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (836) Feb 9 19:15:45.011131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/hosts" Feb 9 19:15:45.011131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:15:45.011131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3547709493" Feb 9 19:15:45.011131 ignition[836]: CRITICAL : files: createFilesystemsFiles: createFiles: op(5): op(6): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3547709493": device or resource busy Feb 9 19:15:45.011131 ignition[836]: ERROR : files: createFilesystemsFiles: createFiles: op(5): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3547709493", trying btrfs: device or resource busy Feb 9 19:15:45.011131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3547709493" Feb 9 19:15:45.011131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3547709493" Feb 9 19:15:45.011131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [started] unmounting "/mnt/oem3547709493" Feb 9 19:15:45.011131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [finished] unmounting "/mnt/oem3547709493" Feb 9 19:15:45.011131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/hosts" Feb 9 19:15:45.011131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:15:45.011131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 19:15:45.213163 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET result: OK Feb 9 19:15:45.011868 systemd[1]: mnt-oem3547709493.mount: Deactivated successfully. Feb 9 19:15:45.291520 ignition[836]: DEBUG : files: createFilesystemsFiles: createFiles: op(9): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 19:15:45.315083 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:15:45.315083 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:15:45.315083 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Feb 9 19:15:45.402516 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Feb 9 19:15:48.396918 ignition[836]: DEBUG : files: createFilesystemsFiles: createFiles: op(a): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Feb 9 19:15:48.421128 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:15:48.421128 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 9 19:15:48.421128 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:15:48.477116 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1079957439" Feb 9 19:15:48.477116 ignition[836]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1079957439": device or resource busy Feb 9 19:15:48.477116 ignition[836]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1079957439", trying btrfs: device or resource busy Feb 9 19:15:48.477116 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1079957439" Feb 9 19:15:48.477116 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1079957439" Feb 9 19:15:48.477116 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem1079957439" Feb 9 19:15:48.477116 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem1079957439" Feb 9 19:15:48.477116 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 9 19:15:48.477116 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:15:48.477116 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 9 19:15:48.461386 systemd[1]: mnt-oem1079957439.mount: Deactivated successfully. Feb 9 19:15:48.975381 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET result: OK Feb 9 19:15:56.049717 ignition[836]: DEBUG : files: createFilesystemsFiles: createFiles: op(f): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 9 19:15:56.074135 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:15:56.074135 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:15:56.074135 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 9 19:15:56.259542 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET result: OK Feb 9 19:16:13.375261 ignition[836]: DEBUG : files: createFilesystemsFiles: createFiles: op(10): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 9 19:16:13.399356 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:16:13.399356 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:16:13.399356 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:16:13.399356 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:16:13.399356 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:16:13.399356 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:16:13.399356 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:16:13.399356 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(14): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:16:13.399356 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(14): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:16:13.399356 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(15): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:16:13.399356 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(15): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:16:13.399356 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:16:13.399356 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:16:13.399356 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(17): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 9 19:16:13.399356 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(17): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:16:13.809292 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 19:16:13.809330 kernel: audit: type=1130 audit(1707506173.461:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.809347 kernel: audit: type=1130 audit(1707506173.582:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.809385 kernel: audit: type=1130 audit(1707506173.619:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.809400 kernel: audit: type=1131 audit(1707506173.619:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.809416 kernel: audit: type=1130 audit(1707506173.724:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.809430 kernel: audit: type=1131 audit(1707506173.724:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.424208 systemd[1]: mnt-oem950471955.mount: Deactivated successfully. Feb 9 19:16:13.840131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem950471955" Feb 9 19:16:13.840131 ignition[836]: CRITICAL : files: createFilesystemsFiles: createFiles: op(17): op(18): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem950471955": device or resource busy Feb 9 19:16:13.840131 ignition[836]: ERROR : files: createFilesystemsFiles: createFiles: op(17): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem950471955", trying btrfs: device or resource busy Feb 9 19:16:13.840131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem950471955" Feb 9 19:16:13.840131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem950471955" Feb 9 19:16:13.840131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [started] unmounting "/mnt/oem950471955" Feb 9 19:16:13.840131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [finished] unmounting "/mnt/oem950471955" Feb 9 19:16:13.840131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(17): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 9 19:16:13.840131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 9 19:16:13.840131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(1b): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:16:13.840131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1067224149" Feb 9 19:16:13.840131 ignition[836]: CRITICAL : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1067224149": device or resource busy Feb 9 19:16:13.840131 ignition[836]: ERROR : files: createFilesystemsFiles: createFiles: op(1b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1067224149", trying btrfs: device or resource busy Feb 9 19:16:13.840131 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1067224149" Feb 9 19:16:14.156302 kernel: audit: type=1130 audit(1707506173.879:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.156338 kernel: audit: type=1131 audit(1707506174.087:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.450781 systemd[1]: Finished ignition-files.service. Feb 9 19:16:14.185323 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1067224149" Feb 9 19:16:14.185323 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [started] unmounting "/mnt/oem1067224149" Feb 9 19:16:14.185323 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [finished] unmounting "/mnt/oem1067224149" Feb 9 19:16:14.185323 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 9 19:16:14.185323 ignition[836]: INFO : files: op(1f): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:16:14.185323 ignition[836]: INFO : files: op(1f): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:16:14.185323 ignition[836]: INFO : files: op(20): [started] processing unit "oem-gce.service" Feb 9 19:16:14.185323 ignition[836]: INFO : files: op(20): [finished] processing unit "oem-gce.service" Feb 9 19:16:14.185323 ignition[836]: INFO : files: op(21): [started] processing unit "oem-gce-enable-oslogin.service" Feb 9 19:16:14.185323 ignition[836]: INFO : files: op(21): [finished] processing unit "oem-gce-enable-oslogin.service" Feb 9 19:16:14.185323 ignition[836]: INFO : files: op(22): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:16:14.185323 ignition[836]: INFO : files: op(22): op(23): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:16:14.185323 ignition[836]: INFO : files: op(22): op(23): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:16:14.185323 ignition[836]: INFO : files: op(22): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:16:14.185323 ignition[836]: INFO : files: op(24): [started] processing unit "prepare-critools.service" Feb 9 19:16:14.185323 ignition[836]: INFO : files: op(24): op(25): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:16:14.185323 ignition[836]: INFO : files: op(24): op(25): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:16:14.185323 ignition[836]: INFO : files: op(24): [finished] processing unit "prepare-critools.service" Feb 9 19:16:14.185323 ignition[836]: INFO : files: op(26): [started] processing unit "prepare-helm.service" Feb 9 19:16:14.529271 kernel: audit: type=1131 audit(1707506174.455:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.473525 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:16:14.576128 kernel: audit: type=1131 audit(1707506174.544:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.576260 initrd-setup-root-after-ignition[859]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:16:14.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.600346 ignition[836]: INFO : files: op(26): op(27): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:16:14.600346 ignition[836]: INFO : files: op(26): op(27): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:16:14.600346 ignition[836]: INFO : files: op(26): [finished] processing unit "prepare-helm.service" Feb 9 19:16:14.600346 ignition[836]: INFO : files: op(28): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:16:14.600346 ignition[836]: INFO : files: op(28): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:16:14.600346 ignition[836]: INFO : files: op(29): [started] setting preset to enabled for "oem-gce.service" Feb 9 19:16:14.600346 ignition[836]: INFO : files: op(29): [finished] setting preset to enabled for "oem-gce.service" Feb 9 19:16:14.600346 ignition[836]: INFO : files: op(2a): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 9 19:16:14.600346 ignition[836]: INFO : files: op(2a): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 9 19:16:14.600346 ignition[836]: INFO : files: op(2b): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:16:14.600346 ignition[836]: INFO : files: op(2b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:16:14.600346 ignition[836]: INFO : files: op(2c): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:16:14.600346 ignition[836]: INFO : files: op(2c): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:16:14.600346 ignition[836]: INFO : files: op(2d): [started] setting preset to enabled for "prepare-helm.service" Feb 9 19:16:14.600346 ignition[836]: INFO : files: op(2d): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 19:16:14.600346 ignition[836]: INFO : files: createResultFile: createFiles: op(2e): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:16:14.600346 ignition[836]: INFO : files: createResultFile: createFiles: op(2e): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:16:14.600346 ignition[836]: INFO : files: files passed Feb 9 19:16:14.600346 ignition[836]: INFO : Ignition finished successfully Feb 9 19:16:14.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.504274 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:16:14.958447 iscsid[697]: iscsid shutting down. Feb 9 19:16:13.505346 systemd[1]: Starting ignition-quench.service... Feb 9 19:16:13.547621 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:16:14.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.584634 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:16:15.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.584775 systemd[1]: Finished ignition-quench.service. Feb 9 19:16:13.621521 systemd[1]: Reached target ignition-complete.target. Feb 9 19:16:15.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.683430 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:16:15.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:15.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:15.064292 ignition[874]: INFO : Ignition 2.14.0 Feb 9 19:16:15.064292 ignition[874]: INFO : Stage: umount Feb 9 19:16:15.064292 ignition[874]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:16:15.064292 ignition[874]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:16:15.064292 ignition[874]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:16:15.064292 ignition[874]: INFO : umount: umount passed Feb 9 19:16:15.064292 ignition[874]: INFO : Ignition finished successfully Feb 9 19:16:15.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.724637 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:16:15.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.724767 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:16:15.183000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:16:13.726472 systemd[1]: Reached target initrd-fs.target. Feb 9 19:16:13.809149 systemd[1]: Reached target initrd.target. Feb 9 19:16:15.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.831282 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:16:15.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.832427 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:16:15.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.857568 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:16:13.882717 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:16:15.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:13.958666 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:16:13.967458 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:16:14.009466 systemd[1]: Stopped target timers.target. Feb 9 19:16:15.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.050420 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:16:15.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.050639 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:16:15.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.089732 systemd[1]: Stopped target initrd.target. Feb 9 19:16:14.129519 systemd[1]: Stopped target basic.target. Feb 9 19:16:14.178408 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:16:15.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.194408 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:16:15.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.211504 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:16:15.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.268407 systemd[1]: Stopped target remote-fs.target. Feb 9 19:16:15.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.281468 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:16:15.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:15.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:14.316469 systemd[1]: Stopped target sysinit.target. Feb 9 19:16:14.327470 systemd[1]: Stopped target local-fs.target. Feb 9 19:16:14.363462 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:16:14.384460 systemd[1]: Stopped target swap.target. Feb 9 19:16:14.426390 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:16:15.529110 systemd-journald[189]: Received SIGTERM from PID 1 (systemd). Feb 9 19:16:14.426666 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:16:14.457552 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:16:14.518445 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:16:14.518658 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:16:14.546611 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:16:14.546890 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:16:14.586496 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:16:14.586678 systemd[1]: Stopped ignition-files.service. Feb 9 19:16:14.609863 systemd[1]: Stopping ignition-mount.service... Feb 9 19:16:14.625640 systemd[1]: Stopping iscsid.service... Feb 9 19:16:14.662379 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:16:14.675285 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:16:14.675510 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:16:14.711520 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:16:14.711706 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:16:14.753178 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:16:14.754211 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:16:14.754324 systemd[1]: Stopped iscsid.service. Feb 9 19:16:14.763969 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:16:14.764115 systemd[1]: Stopped ignition-mount.service. Feb 9 19:16:14.781751 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:16:14.781865 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:16:14.800753 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:16:14.800915 systemd[1]: Stopped ignition-disks.service. Feb 9 19:16:14.818293 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:16:14.818358 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:16:14.836451 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 19:16:14.836525 systemd[1]: Stopped ignition-fetch.service. Feb 9 19:16:14.854367 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:16:14.854444 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:16:14.872366 systemd[1]: Stopped target paths.target. Feb 9 19:16:14.914280 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:16:14.918011 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:16:14.936083 systemd[1]: Stopped target slices.target. Feb 9 19:16:14.936199 systemd[1]: Stopped target sockets.target. Feb 9 19:16:14.966140 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:16:14.966210 systemd[1]: Closed iscsid.socket. Feb 9 19:16:14.980233 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:16:14.980334 systemd[1]: Stopped ignition-setup.service. Feb 9 19:16:14.995219 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:16:14.995296 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:16:15.011280 systemd[1]: Stopping iscsiuio.service... Feb 9 19:16:15.026759 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:16:15.026874 systemd[1]: Stopped iscsiuio.service. Feb 9 19:16:15.040618 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:16:15.040729 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:16:15.057228 systemd[1]: Stopped target network.target. Feb 9 19:16:15.073183 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:16:15.073240 systemd[1]: Closed iscsiuio.socket. Feb 9 19:16:15.080420 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:16:15.083983 systemd-networkd[691]: eth0: DHCPv6 lease lost Feb 9 19:16:15.536000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:16:15.109357 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:16:15.136463 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:16:15.136591 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:16:15.161961 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:16:15.162110 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:16:15.177858 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:16:15.177917 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:16:15.194138 systemd[1]: Stopping network-cleanup.service... Feb 9 19:16:15.207047 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:16:15.207160 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:16:15.222169 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:16:15.222239 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:16:15.237332 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:16:15.237392 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:16:15.257371 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:16:15.273841 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 19:16:15.274664 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:16:15.274849 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:16:15.288876 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:16:15.289014 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:16:15.303226 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:16:15.303275 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:16:15.318218 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:16:15.318295 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:16:15.334277 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:16:15.334344 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:16:15.349281 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:16:15.349352 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:16:15.366221 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:16:15.387171 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 19:16:15.387275 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 19:16:15.402363 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:16:15.402428 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:16:15.418277 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:16:15.418351 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:16:15.435746 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 19:16:15.436411 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:16:15.436523 systemd[1]: Stopped network-cleanup.service. Feb 9 19:16:15.450443 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:16:15.450560 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:16:15.465330 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:16:15.482093 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:16:15.496574 systemd[1]: Switching root. Feb 9 19:16:15.541023 systemd-journald[189]: Journal stopped Feb 9 19:16:20.050596 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:16:20.050733 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:16:20.050760 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:16:20.050784 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:16:20.050812 kernel: SELinux: policy capability open_perms=1 Feb 9 19:16:20.050835 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:16:20.050862 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:16:20.050885 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:16:20.050907 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:16:20.050960 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:16:20.050985 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:16:20.051010 systemd[1]: Successfully loaded SELinux policy in 111.265ms. Feb 9 19:16:20.051047 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.351ms. Feb 9 19:16:20.051076 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:16:20.051102 systemd[1]: Detected virtualization kvm. Feb 9 19:16:20.051126 systemd[1]: Detected architecture x86-64. Feb 9 19:16:20.051151 systemd[1]: Detected first boot. Feb 9 19:16:20.051183 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:16:20.051207 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:16:20.051232 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:16:20.051258 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:16:20.051289 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:16:20.051318 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:16:20.051352 kernel: kauditd_printk_skb: 49 callbacks suppressed Feb 9 19:16:20.051376 kernel: audit: type=1334 audit(1707506179.187:89): prog-id=12 op=LOAD Feb 9 19:16:20.051399 kernel: audit: type=1334 audit(1707506179.188:90): prog-id=3 op=UNLOAD Feb 9 19:16:20.051426 kernel: audit: type=1334 audit(1707506179.200:91): prog-id=13 op=LOAD Feb 9 19:16:20.051449 kernel: audit: type=1334 audit(1707506179.214:92): prog-id=14 op=LOAD Feb 9 19:16:20.051476 kernel: audit: type=1334 audit(1707506179.214:93): prog-id=4 op=UNLOAD Feb 9 19:16:20.051508 kernel: audit: type=1334 audit(1707506179.214:94): prog-id=5 op=UNLOAD Feb 9 19:16:20.051532 kernel: audit: type=1334 audit(1707506179.228:95): prog-id=15 op=LOAD Feb 9 19:16:20.051556 kernel: audit: type=1334 audit(1707506179.228:96): prog-id=12 op=UNLOAD Feb 9 19:16:20.051580 kernel: audit: type=1334 audit(1707506179.235:97): prog-id=16 op=LOAD Feb 9 19:16:20.051605 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:16:20.051629 kernel: audit: type=1334 audit(1707506179.242:98): prog-id=17 op=LOAD Feb 9 19:16:20.051654 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:16:20.051680 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:16:20.051710 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:16:20.051737 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:16:20.051763 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 19:16:20.051796 systemd[1]: Created slice system-getty.slice. Feb 9 19:16:20.051822 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:16:20.051846 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:16:20.051887 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:16:20.051918 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:16:20.055572 systemd[1]: Created slice user.slice. Feb 9 19:16:20.055608 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:16:20.055633 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:16:20.055657 systemd[1]: Set up automount boot.automount. Feb 9 19:16:20.055688 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:16:20.055711 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:16:20.055735 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:16:20.055759 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:16:20.055787 systemd[1]: Reached target integritysetup.target. Feb 9 19:16:20.055811 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:16:20.055835 systemd[1]: Reached target remote-fs.target. Feb 9 19:16:20.055859 systemd[1]: Reached target slices.target. Feb 9 19:16:20.055881 systemd[1]: Reached target swap.target. Feb 9 19:16:20.055905 systemd[1]: Reached target torcx.target. Feb 9 19:16:20.055941 systemd[1]: Reached target veritysetup.target. Feb 9 19:16:20.055966 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:16:20.055989 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:16:20.061100 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:16:20.061143 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:16:20.061169 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:16:20.061193 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:16:20.061218 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:16:20.061243 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:16:20.061266 systemd[1]: Mounting media.mount... Feb 9 19:16:20.061289 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:16:20.061312 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:16:20.061335 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:16:20.061362 systemd[1]: Mounting tmp.mount... Feb 9 19:16:20.061387 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:16:20.061567 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:16:20.061596 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:16:20.061622 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:16:20.061646 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:16:20.061670 systemd[1]: Starting modprobe@drm.service... Feb 9 19:16:20.061694 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:16:20.061718 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:16:20.061747 systemd[1]: Starting modprobe@loop.service... Feb 9 19:16:20.061772 kernel: fuse: init (API version 7.34) Feb 9 19:16:20.061797 kernel: loop: module loaded Feb 9 19:16:20.061821 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:16:20.061847 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:16:20.061879 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:16:20.061904 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:16:20.061953 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:16:20.062102 systemd[1]: Stopped systemd-journald.service. Feb 9 19:16:20.062133 systemd[1]: Starting systemd-journald.service... Feb 9 19:16:20.062157 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:16:20.062181 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:16:20.062211 systemd-journald[998]: Journal started Feb 9 19:16:20.062301 systemd-journald[998]: Runtime Journal (/run/log/journal/8a3e26f21d0fabc584150e88200417fd) is 8.0M, max 148.8M, 140.8M free. Feb 9 19:16:15.815000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:16:15.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:16:15.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:16:15.963000 audit: BPF prog-id=10 op=LOAD Feb 9 19:16:15.963000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:16:15.963000 audit: BPF prog-id=11 op=LOAD Feb 9 19:16:15.963000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:16:16.120000 audit[907]: AVC avc: denied { associate } for pid=907 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:16:16.120000 audit[907]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=890 pid=907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:16.120000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:16:16.130000 audit[907]: AVC avc: denied { associate } for pid=907 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:16:16.130000 audit[907]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=890 pid=907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:16.130000 audit: CWD cwd="/" Feb 9 19:16:16.130000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:16.130000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:16.130000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:16:19.187000 audit: BPF prog-id=12 op=LOAD Feb 9 19:16:19.188000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:16:19.200000 audit: BPF prog-id=13 op=LOAD Feb 9 19:16:19.214000 audit: BPF prog-id=14 op=LOAD Feb 9 19:16:19.214000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:16:19.214000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:16:19.228000 audit: BPF prog-id=15 op=LOAD Feb 9 19:16:19.228000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:16:19.235000 audit: BPF prog-id=16 op=LOAD Feb 9 19:16:19.242000 audit: BPF prog-id=17 op=LOAD Feb 9 19:16:19.242000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:16:19.242000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:16:19.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.277000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:16:19.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.017000 audit: BPF prog-id=18 op=LOAD Feb 9 19:16:20.017000 audit: BPF prog-id=19 op=LOAD Feb 9 19:16:20.017000 audit: BPF prog-id=20 op=LOAD Feb 9 19:16:20.017000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:16:20.017000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:16:20.046000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:16:20.046000 audit[998]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe67068170 a2=4000 a3=7ffe6706820c items=0 ppid=1 pid=998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:20.046000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:16:16.116706 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:16:19.187957 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:16:16.117781 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:16Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:16:19.244863 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:16:16.117816 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:16Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:16:16.117870 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:16Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:16:16.117891 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:16Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:16:16.117968 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:16Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:16:16.118000 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:16Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:16:16.118298 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:16Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:16:16.118372 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:16Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:16:16.118398 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:16Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:16:16.121143 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:16Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:16:16.121207 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:16Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:16:16.121244 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:16Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:16:16.121272 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:16Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:16:16.121304 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:16Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:16:16.121331 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:16Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:16:18.598435 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:18Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:16:18.598717 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:18Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:16:18.598850 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:18Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:16:18.599083 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:18Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:16:18.599148 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:18Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:16:18.599220 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2024-02-09T19:16:18Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:16:20.075973 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:16:20.089969 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:16:20.104952 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:16:20.111004 systemd[1]: Stopped verity-setup.service. Feb 9 19:16:20.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.130954 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:16:20.139981 systemd[1]: Started systemd-journald.service. Feb 9 19:16:20.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.149492 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:16:20.157252 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:16:20.164231 systemd[1]: Mounted media.mount. Feb 9 19:16:20.171251 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:16:20.180239 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:16:20.190309 systemd[1]: Mounted tmp.mount. Feb 9 19:16:20.197394 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:16:20.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.206449 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:16:20.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.215422 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:16:20.215667 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:16:20.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.224554 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:16:20.224794 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:16:20.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.233560 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:16:20.233786 systemd[1]: Finished modprobe@drm.service. Feb 9 19:16:20.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.242443 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:16:20.242680 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:16:20.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.251422 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:16:20.251664 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:16:20.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.260574 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:16:20.260783 systemd[1]: Finished modprobe@loop.service. Feb 9 19:16:20.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.269501 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:16:20.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.278462 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:16:20.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.287429 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:16:20.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.296419 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:16:20.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.306742 systemd[1]: Reached target network-pre.target. Feb 9 19:16:20.316689 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:16:20.326452 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:16:20.333077 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:16:20.335528 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:16:20.344592 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:16:20.355705 systemd-journald[998]: Time spent on flushing to /var/log/journal/8a3e26f21d0fabc584150e88200417fd is 70.112ms for 1184 entries. Feb 9 19:16:20.355705 systemd-journald[998]: System Journal (/var/log/journal/8a3e26f21d0fabc584150e88200417fd) is 8.0M, max 584.8M, 576.8M free. Feb 9 19:16:20.455716 systemd-journald[998]: Received client request to flush runtime journal. Feb 9 19:16:20.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.353101 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:16:20.354681 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:16:20.370124 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:16:20.371961 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:16:20.380716 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:16:20.459060 udevadm[1012]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 19:16:20.389670 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:16:20.400233 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:16:20.409179 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:16:20.417352 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:16:20.426484 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:16:20.438656 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:16:20.452390 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:16:20.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.461683 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:16:20.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.471919 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:16:20.528909 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:16:20.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:21.024325 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:16:21.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:21.032000 audit: BPF prog-id=21 op=LOAD Feb 9 19:16:21.032000 audit: BPF prog-id=22 op=LOAD Feb 9 19:16:21.032000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:16:21.032000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:16:21.035176 systemd[1]: Starting systemd-udevd.service... Feb 9 19:16:21.057774 systemd-udevd[1018]: Using default interface naming scheme 'v252'. Feb 9 19:16:21.103866 systemd[1]: Started systemd-udevd.service. Feb 9 19:16:21.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:21.112000 audit: BPF prog-id=23 op=LOAD Feb 9 19:16:21.116017 systemd[1]: Starting systemd-networkd.service... Feb 9 19:16:21.132000 audit: BPF prog-id=24 op=LOAD Feb 9 19:16:21.132000 audit: BPF prog-id=25 op=LOAD Feb 9 19:16:21.132000 audit: BPF prog-id=26 op=LOAD Feb 9 19:16:21.135910 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:16:21.182621 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:16:21.191905 systemd[1]: Started systemd-userdbd.service. Feb 9 19:16:21.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:21.288480 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 19:16:21.328559 systemd-networkd[1030]: lo: Link UP Feb 9 19:16:21.328573 systemd-networkd[1030]: lo: Gained carrier Feb 9 19:16:21.329352 systemd-networkd[1030]: Enumeration completed Feb 9 19:16:21.329486 systemd[1]: Started systemd-networkd.service. Feb 9 19:16:21.329751 systemd-networkd[1030]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:16:21.331827 systemd-networkd[1030]: eth0: Link UP Feb 9 19:16:21.331839 systemd-networkd[1030]: eth0: Gained carrier Feb 9 19:16:21.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:21.342964 kernel: ACPI: button: Power Button [PWRF] Feb 9 19:16:21.347160 systemd-networkd[1030]: eth0: DHCPv4 address 10.128.0.97/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 9 19:16:21.365991 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1042) Feb 9 19:16:21.382074 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Feb 9 19:16:21.416047 kernel: ACPI: button: Sleep Button [SLPF] Feb 9 19:16:21.409000 audit[1031]: AVC avc: denied { confidentiality } for pid=1031 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:16:21.409000 audit[1031]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557256bf3130 a1=32194 a2=7efde72bcbc5 a3=5 items=108 ppid=1018 pid=1031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:21.409000 audit: CWD cwd="/" Feb 9 19:16:21.409000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=1 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=2 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=3 name=(null) inode=13715 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=4 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=5 name=(null) inode=13716 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=6 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=7 name=(null) inode=13717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=8 name=(null) inode=13717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=9 name=(null) inode=13718 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=10 name=(null) inode=13717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=11 name=(null) inode=13719 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=12 name=(null) inode=13717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=13 name=(null) inode=13720 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=14 name=(null) inode=13717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=15 name=(null) inode=13721 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=16 name=(null) inode=13717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=17 name=(null) inode=13722 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=18 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=19 name=(null) inode=13723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=20 name=(null) inode=13723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=21 name=(null) inode=13724 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=22 name=(null) inode=13723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=23 name=(null) inode=13725 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=24 name=(null) inode=13723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=25 name=(null) inode=13726 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=26 name=(null) inode=13723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=27 name=(null) inode=13727 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=28 name=(null) inode=13723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=29 name=(null) inode=13728 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=30 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=31 name=(null) inode=13729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=32 name=(null) inode=13729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=33 name=(null) inode=13730 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=34 name=(null) inode=13729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=35 name=(null) inode=13731 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=36 name=(null) inode=13729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=37 name=(null) inode=13732 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=38 name=(null) inode=13729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=39 name=(null) inode=13733 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=40 name=(null) inode=13729 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=41 name=(null) inode=13734 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=42 name=(null) inode=13714 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=43 name=(null) inode=13735 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=44 name=(null) inode=13735 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=45 name=(null) inode=13736 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=46 name=(null) inode=13735 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=47 name=(null) inode=13737 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=48 name=(null) inode=13735 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=49 name=(null) inode=13738 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=50 name=(null) inode=13735 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=51 name=(null) inode=13739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=52 name=(null) inode=13735 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=53 name=(null) inode=13740 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=55 name=(null) inode=13741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=56 name=(null) inode=13741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=57 name=(null) inode=13742 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=58 name=(null) inode=13741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=59 name=(null) inode=13743 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=60 name=(null) inode=13741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=61 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=62 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=63 name=(null) inode=13745 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=64 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=65 name=(null) inode=13746 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=66 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=67 name=(null) inode=13747 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=68 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=69 name=(null) inode=13748 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=70 name=(null) inode=13744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=71 name=(null) inode=13749 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=72 name=(null) inode=13741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=73 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=74 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=75 name=(null) inode=13751 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=76 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=77 name=(null) inode=13752 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=78 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=79 name=(null) inode=13753 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=80 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=81 name=(null) inode=13754 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=82 name=(null) inode=13750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=83 name=(null) inode=13755 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=84 name=(null) inode=13741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=85 name=(null) inode=13756 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=86 name=(null) inode=13756 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=87 name=(null) inode=13757 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=88 name=(null) inode=13756 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=89 name=(null) inode=13758 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=90 name=(null) inode=13756 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=91 name=(null) inode=13759 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=92 name=(null) inode=13756 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=93 name=(null) inode=13760 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=94 name=(null) inode=13756 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=95 name=(null) inode=13761 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=96 name=(null) inode=13741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=97 name=(null) inode=13762 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=98 name=(null) inode=13762 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=99 name=(null) inode=13763 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=100 name=(null) inode=13762 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=101 name=(null) inode=13764 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=102 name=(null) inode=13762 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=103 name=(null) inode=13765 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=104 name=(null) inode=13762 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=105 name=(null) inode=13766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=106 name=(null) inode=13762 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PATH item=107 name=(null) inode=13767 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:21.409000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 19:16:21.465008 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Feb 9 19:16:21.477962 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Feb 9 19:16:21.490958 kernel: EDAC MC: Ver: 3.0.0 Feb 9 19:16:21.498975 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 19:16:21.509476 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:16:21.520397 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:16:21.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:21.530765 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:16:21.561718 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:16:21.595325 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:16:21.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:21.604264 systemd[1]: Reached target cryptsetup.target. Feb 9 19:16:21.614669 systemd[1]: Starting lvm2-activation.service... Feb 9 19:16:21.621297 lvm[1056]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:16:21.648297 systemd[1]: Finished lvm2-activation.service. Feb 9 19:16:21.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:21.657279 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:16:21.666070 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:16:21.666121 systemd[1]: Reached target local-fs.target. Feb 9 19:16:21.674068 systemd[1]: Reached target machines.target. Feb 9 19:16:21.683564 systemd[1]: Starting ldconfig.service... Feb 9 19:16:21.691857 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:16:21.691972 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:16:21.693769 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:16:21.702717 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:16:21.715063 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:16:21.715416 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:16:21.715524 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:16:21.717358 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:16:21.718103 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1058 (bootctl) Feb 9 19:16:21.721118 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:16:21.745638 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:16:21.748122 systemd-tmpfiles[1062]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:16:21.752296 systemd-tmpfiles[1062]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:16:21.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:21.755752 systemd-tmpfiles[1062]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:16:21.894909 systemd-fsck[1066]: fsck.fat 4.2 (2021-01-31) Feb 9 19:16:21.894909 systemd-fsck[1066]: /dev/sda1: 789 files, 115339/258078 clusters Feb 9 19:16:21.900158 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:16:21.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:21.912182 systemd[1]: Mounting boot.mount... Feb 9 19:16:21.961986 systemd[1]: Mounted boot.mount. Feb 9 19:16:21.991310 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:16:21.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.103176 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:16:22.104373 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:16:22.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.113574 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:16:22.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.124181 systemd[1]: Starting audit-rules.service... Feb 9 19:16:22.132609 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:16:22.142827 systemd[1]: Starting oem-gce-enable-oslogin.service... Feb 9 19:16:22.150721 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:16:22.158000 audit: BPF prog-id=27 op=LOAD Feb 9 19:16:22.161539 systemd[1]: Starting systemd-resolved.service... Feb 9 19:16:22.168000 audit: BPF prog-id=28 op=LOAD Feb 9 19:16:22.171925 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:16:22.181532 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:16:22.189968 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:16:22.190000 audit[1088]: SYSTEM_BOOT pid=1088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.201890 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:16:22.215414 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:16:22.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.229242 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Feb 9 19:16:22.229488 systemd[1]: Finished oem-gce-enable-oslogin.service. Feb 9 19:16:22.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.243427 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:16:22.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.270000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:16:22.270000 audit[1102]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffb9ca4a40 a2=420 a3=0 items=0 ppid=1071 pid=1102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:22.270000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:16:22.274124 systemd[1]: Finished audit-rules.service. Feb 9 19:16:22.274615 augenrules[1102]: No rules Feb 9 19:16:22.330051 systemd-resolved[1083]: Positive Trust Anchors: Feb 9 19:16:22.330543 systemd-resolved[1083]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:16:22.330700 ldconfig[1057]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:16:22.331067 systemd-resolved[1083]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:16:22.337920 systemd[1]: Finished ldconfig.service. Feb 9 19:16:22.347147 systemd[1]: Starting systemd-update-done.service... Feb 9 19:16:22.354311 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:16:22.359158 systemd-timesyncd[1085]: Contacted time server 169.254.169.254:123 (169.254.169.254). Feb 9 19:16:22.359235 systemd-timesyncd[1085]: Initial clock synchronization to Fri 2024-02-09 19:16:22.224175 UTC. Feb 9 19:16:22.363547 systemd[1]: Finished systemd-update-done.service. Feb 9 19:16:22.369184 systemd-resolved[1083]: Defaulting to hostname 'linux'. Feb 9 19:16:22.372210 systemd[1]: Started systemd-resolved.service. Feb 9 19:16:22.381163 systemd[1]: Reached target network.target. Feb 9 19:16:22.390051 systemd[1]: Reached target nss-lookup.target. Feb 9 19:16:22.398083 systemd[1]: Reached target sysinit.target. Feb 9 19:16:22.406214 systemd[1]: Started motdgen.path. Feb 9 19:16:22.413149 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:16:22.423131 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:16:22.432148 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:16:22.432209 systemd[1]: Reached target paths.target. Feb 9 19:16:22.439074 systemd[1]: Reached target time-set.target. Feb 9 19:16:22.447275 systemd[1]: Started logrotate.timer. Feb 9 19:16:22.454266 systemd[1]: Started mdadm.timer. Feb 9 19:16:22.461079 systemd[1]: Reached target timers.target. Feb 9 19:16:22.468552 systemd[1]: Listening on dbus.socket. Feb 9 19:16:22.477520 systemd[1]: Starting docker.socket... Feb 9 19:16:22.488260 systemd[1]: Listening on sshd.socket. Feb 9 19:16:22.495207 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:16:22.495977 systemd[1]: Listening on docker.socket. Feb 9 19:16:22.503206 systemd[1]: Reached target sockets.target. Feb 9 19:16:22.512081 systemd[1]: Reached target basic.target. Feb 9 19:16:22.519125 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:16:22.519170 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:16:22.520737 systemd[1]: Starting containerd.service... Feb 9 19:16:22.529399 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 19:16:22.541382 systemd[1]: Starting dbus.service... Feb 9 19:16:22.550791 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:16:22.559814 jq[1114]: false Feb 9 19:16:22.562510 systemd[1]: Starting extend-filesystems.service... Feb 9 19:16:22.570086 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:16:22.571969 systemd[1]: Starting motdgen.service... Feb 9 19:16:22.580715 systemd[1]: Starting oem-gce.service... Feb 9 19:16:22.589618 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:16:22.598858 systemd[1]: Starting prepare-critools.service... Feb 9 19:16:22.607639 systemd[1]: Starting prepare-helm.service... Feb 9 19:16:22.617990 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:16:22.624189 extend-filesystems[1116]: Found sda Feb 9 19:16:22.624189 extend-filesystems[1116]: Found sda1 Feb 9 19:16:22.624189 extend-filesystems[1116]: Found sda2 Feb 9 19:16:22.624189 extend-filesystems[1116]: Found sda3 Feb 9 19:16:22.624189 extend-filesystems[1116]: Found usr Feb 9 19:16:22.624189 extend-filesystems[1116]: Found sda4 Feb 9 19:16:22.624189 extend-filesystems[1116]: Found sda6 Feb 9 19:16:22.624189 extend-filesystems[1116]: Found sda7 Feb 9 19:16:22.624119 systemd-networkd[1030]: eth0: Gained IPv6LL Feb 9 19:16:22.741212 extend-filesystems[1116]: Found sda9 Feb 9 19:16:22.741212 extend-filesystems[1116]: Checking size of /dev/sda9 Feb 9 19:16:22.741212 extend-filesystems[1116]: Resized partition /dev/sda9 Feb 9 19:16:22.816680 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Feb 9 19:16:22.626854 systemd[1]: Starting sshd-keygen.service... Feb 9 19:16:22.764534 dbus-daemon[1113]: [system] SELinux support is enabled Feb 9 19:16:22.817220 extend-filesystems[1145]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 19:16:22.837167 kernel: loop0: detected capacity change from 0 to 2097152 Feb 9 19:16:22.639097 systemd[1]: Starting systemd-logind.service... Feb 9 19:16:22.774152 dbus-daemon[1113]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1030 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 9 19:16:22.649250 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:16:22.784776 dbus-daemon[1113]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 19:16:22.649368 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Feb 9 19:16:22.838480 jq[1141]: true Feb 9 19:16:22.650156 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:16:22.651489 systemd[1]: Starting update-engine.service... Feb 9 19:16:22.839263 tar[1148]: ./ Feb 9 19:16:22.839263 tar[1148]: ./loopback Feb 9 19:16:22.658493 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:16:22.678697 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:16:22.840220 tar[1149]: crictl Feb 9 19:16:22.678965 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:16:22.679503 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:16:22.841093 jq[1155]: true Feb 9 19:16:22.679813 systemd[1]: Finished motdgen.service. Feb 9 19:16:22.841629 mkfs.ext4[1157]: mke2fs 1.46.5 (30-Dec-2021) Feb 9 19:16:22.841629 mkfs.ext4[1157]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Feb 9 19:16:22.841629 mkfs.ext4[1157]: Creating filesystem with 262144 4k blocks and 65536 inodes Feb 9 19:16:22.841629 mkfs.ext4[1157]: Filesystem UUID: e26dc57e-34c8-44ee-9761-e0ea19909272 Feb 9 19:16:22.841629 mkfs.ext4[1157]: Superblock backups stored on blocks: Feb 9 19:16:22.841629 mkfs.ext4[1157]: 32768, 98304, 163840, 229376 Feb 9 19:16:22.841629 mkfs.ext4[1157]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:16:22.841629 mkfs.ext4[1157]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:16:22.841629 mkfs.ext4[1157]: Creating journal (8192 blocks): done Feb 9 19:16:22.841629 mkfs.ext4[1157]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:16:22.689563 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:16:22.689860 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:16:22.765194 systemd[1]: Started dbus.service. Feb 9 19:16:22.783368 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:16:22.783433 systemd[1]: Reached target system-config.target. Feb 9 19:16:22.843851 umount[1161]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Feb 9 19:16:22.792235 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:16:22.792275 systemd[1]: Reached target user-config.target. Feb 9 19:16:22.812626 systemd[1]: Starting systemd-hostnamed.service... Feb 9 19:16:22.854182 tar[1150]: linux-amd64/helm Feb 9 19:16:22.882660 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Feb 9 19:16:22.932461 update_engine[1139]: I0209 19:16:22.918093 1139 main.cc:92] Flatcar Update Engine starting Feb 9 19:16:22.932461 update_engine[1139]: I0209 19:16:22.929659 1139 update_check_scheduler.cc:74] Next update check in 11m11s Feb 9 19:16:22.929215 systemd[1]: Started update-engine.service. Feb 9 19:16:22.941231 systemd[1]: Started locksmithd.service. Feb 9 19:16:22.944332 extend-filesystems[1145]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 9 19:16:22.944332 extend-filesystems[1145]: old_desc_blocks = 1, new_desc_blocks = 2 Feb 9 19:16:22.944332 extend-filesystems[1145]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Feb 9 19:16:23.021519 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:16:23.021616 tar[1148]: ./bandwidth Feb 9 19:16:22.948769 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:16:23.021805 bash[1181]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:16:23.021981 extend-filesystems[1116]: Resized filesystem in /dev/sda9 Feb 9 19:16:22.949101 systemd[1]: Finished extend-filesystems.service. Feb 9 19:16:22.957592 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:16:23.073164 tar[1148]: ./ptp Feb 9 19:16:23.109118 env[1156]: time="2024-02-09T19:16:23.109039471Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:16:23.139811 tar[1148]: ./vlan Feb 9 19:16:23.204653 tar[1148]: ./host-device Feb 9 19:16:23.238922 systemd-logind[1136]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 19:16:23.246428 systemd-logind[1136]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 19:16:23.246681 systemd-logind[1136]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 19:16:23.250279 systemd-logind[1136]: New seat seat0. Feb 9 19:16:23.255997 coreos-metadata[1112]: Feb 09 19:16:23.255 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Feb 9 19:16:23.259562 systemd[1]: Started systemd-logind.service. Feb 9 19:16:23.260983 tar[1148]: ./tuning Feb 9 19:16:23.262662 coreos-metadata[1112]: Feb 09 19:16:23.260 INFO Fetch failed with 404: resource not found Feb 9 19:16:23.262884 coreos-metadata[1112]: Feb 09 19:16:23.262 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Feb 9 19:16:23.287920 coreos-metadata[1112]: Feb 09 19:16:23.287 INFO Fetch successful Feb 9 19:16:23.288216 coreos-metadata[1112]: Feb 09 19:16:23.288 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Feb 9 19:16:23.290696 coreos-metadata[1112]: Feb 09 19:16:23.290 INFO Fetch failed with 404: resource not found Feb 9 19:16:23.290975 coreos-metadata[1112]: Feb 09 19:16:23.290 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Feb 9 19:16:23.293311 coreos-metadata[1112]: Feb 09 19:16:23.293 INFO Fetch failed with 404: resource not found Feb 9 19:16:23.293531 coreos-metadata[1112]: Feb 09 19:16:23.293 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Feb 9 19:16:23.296498 coreos-metadata[1112]: Feb 09 19:16:23.296 INFO Fetch successful Feb 9 19:16:23.299502 unknown[1112]: wrote ssh authorized keys file for user: core Feb 9 19:16:23.312681 tar[1148]: ./vrf Feb 9 19:16:23.336331 env[1156]: time="2024-02-09T19:16:23.336237720Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:16:23.350138 update-ssh-keys[1192]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:16:23.351369 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 19:16:23.354579 env[1156]: time="2024-02-09T19:16:23.354535981Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:16:23.358728 env[1156]: time="2024-02-09T19:16:23.358675328Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:16:23.360391 dbus-daemon[1113]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 9 19:16:23.361064 dbus-daemon[1113]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1165 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 9 19:16:23.361549 systemd[1]: Started systemd-hostnamed.service. Feb 9 19:16:23.364029 env[1156]: time="2024-02-09T19:16:23.363989693Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:16:23.364611 env[1156]: time="2024-02-09T19:16:23.364576053Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:16:23.364734 env[1156]: time="2024-02-09T19:16:23.364714002Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:16:23.364843 env[1156]: time="2024-02-09T19:16:23.364818878Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:16:23.365032 env[1156]: time="2024-02-09T19:16:23.365008011Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:16:23.365256 env[1156]: time="2024-02-09T19:16:23.365231291Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:16:23.365698 env[1156]: time="2024-02-09T19:16:23.365670944Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:16:23.368971 env[1156]: time="2024-02-09T19:16:23.368919902Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:16:23.369099 env[1156]: time="2024-02-09T19:16:23.369076179Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:16:23.369257 env[1156]: time="2024-02-09T19:16:23.369236957Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:16:23.369368 env[1156]: time="2024-02-09T19:16:23.369348407Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:16:23.374598 systemd[1]: Starting polkit.service... Feb 9 19:16:23.395487 env[1156]: time="2024-02-09T19:16:23.395396098Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:16:23.396237 env[1156]: time="2024-02-09T19:16:23.396211311Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:16:23.396365 env[1156]: time="2024-02-09T19:16:23.396343920Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:16:23.396595 env[1156]: time="2024-02-09T19:16:23.396508995Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:16:23.396845 env[1156]: time="2024-02-09T19:16:23.396819462Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:16:23.396998 env[1156]: time="2024-02-09T19:16:23.396977078Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:16:23.397132 env[1156]: time="2024-02-09T19:16:23.397111703Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:16:23.397246 env[1156]: time="2024-02-09T19:16:23.397228561Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:16:23.397376 env[1156]: time="2024-02-09T19:16:23.397348411Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:16:23.397599 env[1156]: time="2024-02-09T19:16:23.397575509Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:16:23.397733 env[1156]: time="2024-02-09T19:16:23.397712798Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:16:23.397888 env[1156]: time="2024-02-09T19:16:23.397839008Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:16:23.398191 env[1156]: time="2024-02-09T19:16:23.398168305Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:16:23.398568 env[1156]: time="2024-02-09T19:16:23.398543581Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:16:23.399232 env[1156]: time="2024-02-09T19:16:23.399205338Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:16:23.399383 env[1156]: time="2024-02-09T19:16:23.399361132Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:16:23.399486 env[1156]: time="2024-02-09T19:16:23.399466338Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:16:23.399638 env[1156]: time="2024-02-09T19:16:23.399618713Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:16:23.399827 env[1156]: time="2024-02-09T19:16:23.399806695Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:16:23.399942 env[1156]: time="2024-02-09T19:16:23.399906700Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:16:23.400043 env[1156]: time="2024-02-09T19:16:23.400022552Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:16:23.400138 env[1156]: time="2024-02-09T19:16:23.400119218Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:16:23.400232 env[1156]: time="2024-02-09T19:16:23.400216318Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:16:23.400399 env[1156]: time="2024-02-09T19:16:23.400376259Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:16:23.400511 env[1156]: time="2024-02-09T19:16:23.400492740Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:16:23.400612 env[1156]: time="2024-02-09T19:16:23.400593621Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:16:23.400904 env[1156]: time="2024-02-09T19:16:23.400879569Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:16:23.401697 env[1156]: time="2024-02-09T19:16:23.401669610Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:16:23.402478 env[1156]: time="2024-02-09T19:16:23.402450434Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:16:23.404970 env[1156]: time="2024-02-09T19:16:23.404908603Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:16:23.411864 env[1156]: time="2024-02-09T19:16:23.411825726Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:16:23.413786 env[1156]: time="2024-02-09T19:16:23.413754223Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:16:23.413947 env[1156]: time="2024-02-09T19:16:23.413898159Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:16:23.414138 env[1156]: time="2024-02-09T19:16:23.414114048Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:16:23.414671 env[1156]: time="2024-02-09T19:16:23.414584594Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:16:23.418143 env[1156]: time="2024-02-09T19:16:23.414861631Z" level=info msg="Connect containerd service" Feb 9 19:16:23.418143 env[1156]: time="2024-02-09T19:16:23.414962290Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:16:23.418143 env[1156]: time="2024-02-09T19:16:23.416780919Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:16:23.418400 env[1156]: time="2024-02-09T19:16:23.418375525Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:16:23.424195 env[1156]: time="2024-02-09T19:16:23.424082146Z" level=info msg="Start subscribing containerd event" Feb 9 19:16:23.429079 env[1156]: time="2024-02-09T19:16:23.429043466Z" level=info msg="Start recovering state" Feb 9 19:16:23.429328 env[1156]: time="2024-02-09T19:16:23.429307795Z" level=info msg="Start event monitor" Feb 9 19:16:23.429458 env[1156]: time="2024-02-09T19:16:23.429438001Z" level=info msg="Start snapshots syncer" Feb 9 19:16:23.429571 env[1156]: time="2024-02-09T19:16:23.429552321Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:16:23.429676 env[1156]: time="2024-02-09T19:16:23.429658790Z" level=info msg="Start streaming server" Feb 9 19:16:23.430085 env[1156]: time="2024-02-09T19:16:23.430039973Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:16:23.433999 systemd[1]: Started containerd.service. Feb 9 19:16:23.434415 env[1156]: time="2024-02-09T19:16:23.434391087Z" level=info msg="containerd successfully booted in 0.353822s" Feb 9 19:16:23.492734 polkitd[1194]: Started polkitd version 121 Feb 9 19:16:23.519816 tar[1148]: ./sbr Feb 9 19:16:23.531696 polkitd[1194]: Loading rules from directory /etc/polkit-1/rules.d Feb 9 19:16:23.536057 polkitd[1194]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 9 19:16:23.544456 polkitd[1194]: Finished loading, compiling and executing 2 rules Feb 9 19:16:23.545316 dbus-daemon[1113]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 9 19:16:23.545529 systemd[1]: Started polkit.service. Feb 9 19:16:23.546453 polkitd[1194]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 9 19:16:23.580032 systemd-hostnamed[1165]: Hostname set to (transient) Feb 9 19:16:23.582653 systemd-resolved[1083]: System hostname changed to 'ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal'. Feb 9 19:16:23.656044 tar[1148]: ./tap Feb 9 19:16:23.829616 tar[1148]: ./dhcp Feb 9 19:16:24.274960 tar[1148]: ./static Feb 9 19:16:24.405886 systemd[1]: Created slice system-sshd.slice. Feb 9 19:16:24.428790 tar[1148]: ./firewall Feb 9 19:16:24.621482 tar[1148]: ./macvlan Feb 9 19:16:24.671757 tar[1150]: linux-amd64/LICENSE Feb 9 19:16:24.672430 tar[1150]: linux-amd64/README.md Feb 9 19:16:24.689037 systemd[1]: Finished prepare-helm.service. Feb 9 19:16:24.794293 tar[1148]: ./dummy Feb 9 19:16:24.974555 tar[1148]: ./bridge Feb 9 19:16:25.108697 tar[1148]: ./ipvlan Feb 9 19:16:25.240028 tar[1148]: ./portmap Feb 9 19:16:25.249010 systemd[1]: Finished prepare-critools.service. Feb 9 19:16:25.351976 tar[1148]: ./host-local Feb 9 19:16:25.469093 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:16:26.947180 locksmithd[1182]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:16:28.551752 sshd_keygen[1147]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:16:28.679577 systemd[1]: Finished sshd-keygen.service. Feb 9 19:16:28.690552 systemd[1]: Starting issuegen.service... Feb 9 19:16:28.700022 systemd[1]: Started sshd@0-10.128.0.97:22-147.75.109.163:34944.service. Feb 9 19:16:28.721503 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:16:28.721761 systemd[1]: Finished issuegen.service. Feb 9 19:16:28.731700 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:16:28.757709 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:16:28.769495 systemd[1]: Started getty@tty1.service. Feb 9 19:16:28.778261 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:16:28.787443 systemd[1]: Reached target getty.target. Feb 9 19:16:29.042600 sshd[1220]: Accepted publickey for core from 147.75.109.163 port 34944 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:16:29.045080 sshd[1220]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:29.065411 systemd[1]: Created slice user-500.slice. Feb 9 19:16:29.074172 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:16:29.085086 systemd-logind[1136]: New session 1 of user core. Feb 9 19:16:29.093895 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:16:29.104464 systemd[1]: Starting user@500.service... Feb 9 19:16:29.125350 (systemd)[1228]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:29.237418 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Feb 9 19:16:29.300347 systemd[1228]: Queued start job for default target default.target. Feb 9 19:16:29.302545 systemd[1228]: Reached target paths.target. Feb 9 19:16:29.302580 systemd[1228]: Reached target sockets.target. Feb 9 19:16:29.302603 systemd[1228]: Reached target timers.target. Feb 9 19:16:29.302624 systemd[1228]: Reached target basic.target. Feb 9 19:16:29.302771 systemd[1]: Started user@500.service. Feb 9 19:16:29.303871 systemd[1228]: Reached target default.target. Feb 9 19:16:29.303971 systemd[1228]: Startup finished in 165ms. Feb 9 19:16:29.312431 systemd[1]: Started session-1.scope. Feb 9 19:16:29.539900 systemd[1]: Started sshd@1-10.128.0.97:22-147.75.109.163:38188.service. Feb 9 19:16:29.856438 sshd[1238]: Accepted publickey for core from 147.75.109.163 port 38188 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:16:29.858364 sshd[1238]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:29.864519 systemd-logind[1136]: New session 2 of user core. Feb 9 19:16:29.865238 systemd[1]: Started session-2.scope. Feb 9 19:16:30.133247 sshd[1238]: pam_unix(sshd:session): session closed for user core Feb 9 19:16:30.138519 systemd[1]: sshd@1-10.128.0.97:22-147.75.109.163:38188.service: Deactivated successfully. Feb 9 19:16:30.139656 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 19:16:30.140542 systemd-logind[1136]: Session 2 logged out. Waiting for processes to exit. Feb 9 19:16:30.142352 systemd-logind[1136]: Removed session 2. Feb 9 19:16:30.179452 systemd[1]: Started sshd@2-10.128.0.97:22-147.75.109.163:38196.service. Feb 9 19:16:30.468794 sshd[1244]: Accepted publickey for core from 147.75.109.163 port 38196 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:16:30.470704 sshd[1244]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:30.477013 systemd-logind[1136]: New session 3 of user core. Feb 9 19:16:30.477155 systemd[1]: Started session-3.scope. Feb 9 19:16:30.683554 sshd[1244]: pam_unix(sshd:session): session closed for user core Feb 9 19:16:30.687699 systemd[1]: sshd@2-10.128.0.97:22-147.75.109.163:38196.service: Deactivated successfully. Feb 9 19:16:30.688731 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 19:16:30.689621 systemd-logind[1136]: Session 3 logged out. Waiting for processes to exit. Feb 9 19:16:30.690841 systemd-logind[1136]: Removed session 3. Feb 9 19:16:31.274999 kernel: loop0: detected capacity change from 0 to 2097152 Feb 9 19:16:31.295204 systemd-nspawn[1249]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Feb 9 19:16:31.295204 systemd-nspawn[1249]: Press ^] three times within 1s to kill container. Feb 9 19:16:31.308961 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:16:31.334055 systemd[1]: tmp-unifiedXo031Q.mount: Deactivated successfully. Feb 9 19:16:31.397403 systemd[1]: Started oem-gce.service. Feb 9 19:16:31.404551 systemd[1]: Reached target multi-user.target. Feb 9 19:16:31.415208 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:16:31.428366 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:16:31.428659 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:16:31.438281 systemd[1]: Startup finished in 1.039s (kernel) + 35.875s (initrd) + 15.747s (userspace) = 52.663s. Feb 9 19:16:31.466846 systemd-nspawn[1249]: + '[' -e /etc/default/instance_configs.cfg.template ']' Feb 9 19:16:31.466846 systemd-nspawn[1249]: + echo -e '[InstanceSetup]\nset_host_keys = false' Feb 9 19:16:31.467368 systemd-nspawn[1249]: + /usr/bin/google_instance_setup Feb 9 19:16:32.147040 instance-setup[1255]: INFO Running google_set_multiqueue. Feb 9 19:16:32.160824 instance-setup[1255]: INFO Set channels for eth0 to 2. Feb 9 19:16:32.164767 instance-setup[1255]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Feb 9 19:16:32.166307 instance-setup[1255]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Feb 9 19:16:32.166864 instance-setup[1255]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Feb 9 19:16:32.168187 instance-setup[1255]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Feb 9 19:16:32.168625 instance-setup[1255]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Feb 9 19:16:32.170080 instance-setup[1255]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Feb 9 19:16:32.170502 instance-setup[1255]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Feb 9 19:16:32.171996 instance-setup[1255]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Feb 9 19:16:32.184544 instance-setup[1255]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Feb 9 19:16:32.184706 instance-setup[1255]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Feb 9 19:16:32.224621 systemd-nspawn[1249]: + /usr/bin/google_metadata_script_runner --script-type startup Feb 9 19:16:32.555583 startup-script[1286]: INFO Starting startup scripts. Feb 9 19:16:32.568655 startup-script[1286]: INFO No startup scripts found in metadata. Feb 9 19:16:32.568835 startup-script[1286]: INFO Finished running startup scripts. Feb 9 19:16:32.601373 systemd-nspawn[1249]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Feb 9 19:16:32.601373 systemd-nspawn[1249]: + daemon_pids=() Feb 9 19:16:32.602109 systemd-nspawn[1249]: + for d in accounts clock_skew network Feb 9 19:16:32.602109 systemd-nspawn[1249]: + daemon_pids+=($!) Feb 9 19:16:32.602109 systemd-nspawn[1249]: + for d in accounts clock_skew network Feb 9 19:16:32.602322 systemd-nspawn[1249]: + daemon_pids+=($!) Feb 9 19:16:32.602456 systemd-nspawn[1249]: + for d in accounts clock_skew network Feb 9 19:16:32.602807 systemd-nspawn[1249]: + daemon_pids+=($!) Feb 9 19:16:32.602993 systemd-nspawn[1249]: + /usr/bin/google_clock_skew_daemon Feb 9 19:16:32.603073 systemd-nspawn[1249]: + NOTIFY_SOCKET=/run/systemd/notify Feb 9 19:16:32.603128 systemd-nspawn[1249]: + /usr/bin/systemd-notify --ready Feb 9 19:16:32.603743 systemd-nspawn[1249]: + /usr/bin/google_network_daemon Feb 9 19:16:32.603852 systemd-nspawn[1249]: + /usr/bin/google_accounts_daemon Feb 9 19:16:32.664041 systemd-nspawn[1249]: + wait -n 36 37 38 Feb 9 19:16:33.171084 google-clock-skew[1290]: INFO Starting Google Clock Skew daemon. Feb 9 19:16:33.186393 google-clock-skew[1290]: INFO Clock drift token has changed: 0. Feb 9 19:16:33.198295 systemd-nspawn[1249]: hwclock: Cannot access the Hardware Clock via any known method. Feb 9 19:16:33.198618 systemd-nspawn[1249]: hwclock: Use the --verbose option to see the details of our search for an access method. Feb 9 19:16:33.199620 google-clock-skew[1290]: WARNING Failed to sync system time with hardware clock. Feb 9 19:16:33.256390 google-networking[1291]: INFO Starting Google Networking daemon. Feb 9 19:16:33.359809 groupadd[1301]: group added to /etc/group: name=google-sudoers, GID=1000 Feb 9 19:16:33.363903 groupadd[1301]: group added to /etc/gshadow: name=google-sudoers Feb 9 19:16:33.369391 groupadd[1301]: new group: name=google-sudoers, GID=1000 Feb 9 19:16:33.383151 google-accounts[1289]: INFO Starting Google Accounts daemon. Feb 9 19:16:33.408146 google-accounts[1289]: WARNING OS Login not installed. Feb 9 19:16:33.409291 google-accounts[1289]: INFO Creating a new user account for 0. Feb 9 19:16:33.414536 systemd-nspawn[1249]: useradd: invalid user name '0': use --badname to ignore Feb 9 19:16:33.415254 google-accounts[1289]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Feb 9 19:16:40.691342 systemd[1]: Started sshd@3-10.128.0.97:22-147.75.109.163:60266.service. Feb 9 19:16:40.976656 sshd[1312]: Accepted publickey for core from 147.75.109.163 port 60266 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:16:40.978594 sshd[1312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:40.984995 systemd-logind[1136]: New session 4 of user core. Feb 9 19:16:40.985810 systemd[1]: Started session-4.scope. Feb 9 19:16:41.188980 sshd[1312]: pam_unix(sshd:session): session closed for user core Feb 9 19:16:41.192838 systemd[1]: sshd@3-10.128.0.97:22-147.75.109.163:60266.service: Deactivated successfully. Feb 9 19:16:41.193857 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:16:41.194756 systemd-logind[1136]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:16:41.196180 systemd-logind[1136]: Removed session 4. Feb 9 19:16:41.235996 systemd[1]: Started sshd@4-10.128.0.97:22-147.75.109.163:60278.service. Feb 9 19:16:41.527227 sshd[1318]: Accepted publickey for core from 147.75.109.163 port 60278 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:16:41.528815 sshd[1318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:41.535456 systemd[1]: Started session-5.scope. Feb 9 19:16:41.536254 systemd-logind[1136]: New session 5 of user core. Feb 9 19:16:41.737620 sshd[1318]: pam_unix(sshd:session): session closed for user core Feb 9 19:16:41.742009 systemd[1]: sshd@4-10.128.0.97:22-147.75.109.163:60278.service: Deactivated successfully. Feb 9 19:16:41.743153 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:16:41.744038 systemd-logind[1136]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:16:41.745276 systemd-logind[1136]: Removed session 5. Feb 9 19:16:41.783448 systemd[1]: Started sshd@5-10.128.0.97:22-147.75.109.163:60292.service. Feb 9 19:16:42.075239 sshd[1324]: Accepted publickey for core from 147.75.109.163 port 60292 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:16:42.076820 sshd[1324]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:42.083910 systemd[1]: Started session-6.scope. Feb 9 19:16:42.084729 systemd-logind[1136]: New session 6 of user core. Feb 9 19:16:42.290135 sshd[1324]: pam_unix(sshd:session): session closed for user core Feb 9 19:16:42.294004 systemd[1]: sshd@5-10.128.0.97:22-147.75.109.163:60292.service: Deactivated successfully. Feb 9 19:16:42.295031 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:16:42.295877 systemd-logind[1136]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:16:42.297091 systemd-logind[1136]: Removed session 6. Feb 9 19:16:42.335148 systemd[1]: Started sshd@6-10.128.0.97:22-147.75.109.163:60298.service. Feb 9 19:16:42.623328 sshd[1330]: Accepted publickey for core from 147.75.109.163 port 60298 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:16:42.625255 sshd[1330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:42.631623 systemd[1]: Started session-7.scope. Feb 9 19:16:42.632425 systemd-logind[1136]: New session 7 of user core. Feb 9 19:16:42.818676 sudo[1333]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:16:42.819071 sudo[1333]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:16:42.829174 dbus-daemon[1113]: \xd0ݍ\xbe\xbcU: received setenforce notice (enforcing=-108031456) Feb 9 19:16:42.831278 sudo[1333]: pam_unix(sudo:session): session closed for user root Feb 9 19:16:42.875670 sshd[1330]: pam_unix(sshd:session): session closed for user core Feb 9 19:16:42.881104 systemd[1]: sshd@6-10.128.0.97:22-147.75.109.163:60298.service: Deactivated successfully. Feb 9 19:16:42.882414 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:16:42.883434 systemd-logind[1136]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:16:42.885081 systemd-logind[1136]: Removed session 7. Feb 9 19:16:42.920530 systemd[1]: Started sshd@7-10.128.0.97:22-147.75.109.163:60314.service. Feb 9 19:16:43.205167 sshd[1337]: Accepted publickey for core from 147.75.109.163 port 60314 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:16:43.207099 sshd[1337]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:43.213560 systemd[1]: Started session-8.scope. Feb 9 19:16:43.214363 systemd-logind[1136]: New session 8 of user core. Feb 9 19:16:43.381431 sudo[1341]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:16:43.381867 sudo[1341]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:16:43.386395 sudo[1341]: pam_unix(sudo:session): session closed for user root Feb 9 19:16:43.399242 sudo[1340]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:16:43.399721 sudo[1340]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:16:43.413168 systemd[1]: Stopping audit-rules.service... Feb 9 19:16:43.414000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:16:43.420577 kernel: kauditd_printk_skb: 186 callbacks suppressed Feb 9 19:16:43.420716 kernel: audit: type=1305 audit(1707506203.414:170): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:16:43.420769 auditctl[1344]: No rules Feb 9 19:16:43.421800 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:16:43.422114 systemd[1]: Stopped audit-rules.service. Feb 9 19:16:43.414000 audit[1344]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd3a343800 a2=420 a3=0 items=0 ppid=1 pid=1344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:43.437427 systemd[1]: Starting audit-rules.service... Feb 9 19:16:43.466327 kernel: audit: type=1300 audit(1707506203.414:170): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd3a343800 a2=420 a3=0 items=0 ppid=1 pid=1344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:43.466503 kernel: audit: type=1327 audit(1707506203.414:170): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:16:43.414000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:16:43.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:43.478881 augenrules[1361]: No rules Feb 9 19:16:43.480259 systemd[1]: Finished audit-rules.service. Feb 9 19:16:43.481953 sudo[1340]: pam_unix(sudo:session): session closed for user root Feb 9 19:16:43.497549 kernel: audit: type=1131 audit(1707506203.419:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:43.497723 kernel: audit: type=1130 audit(1707506203.474:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:43.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:43.520857 kernel: audit: type=1106 audit(1707506203.480:173): pid=1340 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:16:43.480000 audit[1340]: USER_END pid=1340 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:16:43.547993 kernel: audit: type=1104 audit(1707506203.480:174): pid=1340 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:16:43.480000 audit[1340]: CRED_DISP pid=1340 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:16:43.547540 sshd[1337]: pam_unix(sshd:session): session closed for user core Feb 9 19:16:43.556303 systemd[1]: sshd@7-10.128.0.97:22-147.75.109.163:60314.service: Deactivated successfully. Feb 9 19:16:43.557399 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 19:16:43.559284 systemd-logind[1136]: Session 8 logged out. Waiting for processes to exit. Feb 9 19:16:43.561246 systemd-logind[1136]: Removed session 8. Feb 9 19:16:43.551000 audit[1337]: USER_END pid=1337 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:43.567947 kernel: audit: type=1106 audit(1707506203.551:175): pid=1337 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:43.551000 audit[1337]: CRED_DISP pid=1337 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:43.606459 systemd[1]: Started sshd@8-10.128.0.97:22-147.75.109.163:60326.service. Feb 9 19:16:43.623875 kernel: audit: type=1104 audit(1707506203.551:176): pid=1337 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:43.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.97:22-147.75.109.163:60314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:43.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.97:22-147.75.109.163:60326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:43.650017 kernel: audit: type=1131 audit(1707506203.555:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.97:22-147.75.109.163:60314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:43.896000 audit[1367]: USER_ACCT pid=1367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:43.899208 sshd[1367]: Accepted publickey for core from 147.75.109.163 port 60326 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:16:43.898000 audit[1367]: CRED_ACQ pid=1367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:43.898000 audit[1367]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8ae3ad60 a2=3 a3=0 items=0 ppid=1 pid=1367 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:43.898000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:16:43.900262 sshd[1367]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:43.905997 systemd-logind[1136]: New session 9 of user core. Feb 9 19:16:43.907024 systemd[1]: Started session-9.scope. Feb 9 19:16:43.913000 audit[1367]: USER_START pid=1367 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:43.916000 audit[1369]: CRED_ACQ pid=1369 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:44.071000 audit[1370]: USER_ACCT pid=1370 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:16:44.073499 sudo[1370]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:16:44.071000 audit[1370]: CRED_REFR pid=1370 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:16:44.073906 sudo[1370]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:16:44.074000 audit[1370]: USER_START pid=1370 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:16:44.677667 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:16:44.686587 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:16:44.687163 systemd[1]: Reached target network-online.target. Feb 9 19:16:44.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:44.689221 systemd[1]: Starting docker.service... Feb 9 19:16:44.737056 env[1386]: time="2024-02-09T19:16:44.736990157Z" level=info msg="Starting up" Feb 9 19:16:44.739587 env[1386]: time="2024-02-09T19:16:44.739534885Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:16:44.739587 env[1386]: time="2024-02-09T19:16:44.739580125Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:16:44.739838 env[1386]: time="2024-02-09T19:16:44.739609781Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:16:44.739838 env[1386]: time="2024-02-09T19:16:44.739625659Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:16:44.742041 env[1386]: time="2024-02-09T19:16:44.742016424Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:16:44.742154 env[1386]: time="2024-02-09T19:16:44.742137526Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:16:44.742242 env[1386]: time="2024-02-09T19:16:44.742226811Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:16:44.742302 env[1386]: time="2024-02-09T19:16:44.742290061Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:16:44.753857 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3257417513-merged.mount: Deactivated successfully. Feb 9 19:16:44.812715 env[1386]: time="2024-02-09T19:16:44.812660506Z" level=info msg="Loading containers: start." Feb 9 19:16:44.882000 audit[1416]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:44.882000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffea02b42d0 a2=0 a3=7ffea02b42bc items=0 ppid=1386 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:44.882000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 19:16:44.886000 audit[1419]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:44.886000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe9494c130 a2=0 a3=7ffe9494c11c items=0 ppid=1386 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:44.886000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 19:16:44.889000 audit[1421]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:44.889000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffffbf81240 a2=0 a3=7ffffbf8122c items=0 ppid=1386 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:44.889000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:16:44.892000 audit[1423]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:44.892000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd72d10be0 a2=0 a3=7ffd72d10bcc items=0 ppid=1386 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:44.892000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:16:44.896000 audit[1425]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:44.896000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff39130020 a2=0 a3=7fff3913000c items=0 ppid=1386 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:44.896000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 19:16:44.914000 audit[1430]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:44.914000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffed6eeb7c0 a2=0 a3=7ffed6eeb7ac items=0 ppid=1386 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:44.914000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 19:16:44.925000 audit[1432]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:44.925000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc7110de40 a2=0 a3=7ffc7110de2c items=0 ppid=1386 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:44.925000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 19:16:44.928000 audit[1434]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:44.928000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe927a9ad0 a2=0 a3=7ffe927a9abc items=0 ppid=1386 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:44.928000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 19:16:44.932000 audit[1436]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:44.932000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff0f4b0610 a2=0 a3=7fff0f4b05fc items=0 ppid=1386 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:44.932000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:16:44.944000 audit[1440]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:44.944000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcb25ba960 a2=0 a3=7ffcb25ba94c items=0 ppid=1386 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:44.944000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:16:44.945000 audit[1441]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:44.945000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd18f33a00 a2=0 a3=7ffd18f339ec items=0 ppid=1386 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:44.945000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:16:44.960975 kernel: Initializing XFRM netlink socket Feb 9 19:16:45.004315 env[1386]: time="2024-02-09T19:16:45.004254166Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 19:16:45.034000 audit[1449]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:45.034000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffeff816830 a2=0 a3=7ffeff81681c items=0 ppid=1386 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:45.034000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 19:16:45.045000 audit[1452]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:45.045000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdc493fcc0 a2=0 a3=7ffdc493fcac items=0 ppid=1386 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:45.045000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 19:16:45.050000 audit[1455]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:45.050000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc0d9ae870 a2=0 a3=7ffc0d9ae85c items=0 ppid=1386 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:45.050000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 19:16:45.052000 audit[1457]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:45.052000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff303053e0 a2=0 a3=7fff303053cc items=0 ppid=1386 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:45.052000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 19:16:45.055000 audit[1459]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:45.055000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffda5d6800 a2=0 a3=7fffda5d67ec items=0 ppid=1386 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:45.055000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 19:16:45.058000 audit[1461]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:45.058000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffdb6503d60 a2=0 a3=7ffdb6503d4c items=0 ppid=1386 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:45.058000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 19:16:45.061000 audit[1463]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:45.061000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd19200ae0 a2=0 a3=7ffd19200acc items=0 ppid=1386 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:45.061000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 19:16:45.074000 audit[1466]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:45.074000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc0306dab0 a2=0 a3=7ffc0306da9c items=0 ppid=1386 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:45.074000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 19:16:45.077000 audit[1468]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:45.077000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe82571050 a2=0 a3=7ffe8257103c items=0 ppid=1386 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:45.077000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:16:45.080000 audit[1470]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:45.080000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd37a90630 a2=0 a3=7ffd37a9061c items=0 ppid=1386 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:45.080000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:16:45.083000 audit[1472]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:45.083000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffc3752330 a2=0 a3=7fffc375231c items=0 ppid=1386 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:45.083000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 19:16:45.086086 systemd-networkd[1030]: docker0: Link UP Feb 9 19:16:45.096000 audit[1476]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:45.096000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdd7340dc0 a2=0 a3=7ffdd7340dac items=0 ppid=1386 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:45.096000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:16:45.098000 audit[1477]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1477 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:45.098000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcffec1d20 a2=0 a3=7ffcffec1d0c items=0 ppid=1386 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:45.098000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:16:45.101246 env[1386]: time="2024-02-09T19:16:45.101190692Z" level=info msg="Loading containers: done." Feb 9 19:16:45.124145 env[1386]: time="2024-02-09T19:16:45.124078804Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 19:16:45.124437 env[1386]: time="2024-02-09T19:16:45.124397110Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 19:16:45.124589 env[1386]: time="2024-02-09T19:16:45.124546248Z" level=info msg="Daemon has completed initialization" Feb 9 19:16:45.145099 systemd[1]: Started docker.service. Feb 9 19:16:45.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:45.157656 env[1386]: time="2024-02-09T19:16:45.157585000Z" level=info msg="API listen on /run/docker.sock" Feb 9 19:16:45.182904 systemd[1]: Reloading. Feb 9 19:16:45.262665 /usr/lib/systemd/system-generators/torcx-generator[1525]: time="2024-02-09T19:16:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:16:45.262716 /usr/lib/systemd/system-generators/torcx-generator[1525]: time="2024-02-09T19:16:45Z" level=info msg="torcx already run" Feb 9 19:16:45.391306 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:16:45.391333 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:16:45.417815 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:16:45.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.504000 audit: BPF prog-id=37 op=LOAD Feb 9 19:16:45.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.504000 audit: BPF prog-id=38 op=LOAD Feb 9 19:16:45.504000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:16:45.504000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit: BPF prog-id=39 op=LOAD Feb 9 19:16:45.508000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit: BPF prog-id=40 op=LOAD Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.508000 audit: BPF prog-id=41 op=LOAD Feb 9 19:16:45.508000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:16:45.508000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:16:45.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit: BPF prog-id=42 op=LOAD Feb 9 19:16:45.510000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit: BPF prog-id=43 op=LOAD Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.510000 audit: BPF prog-id=44 op=LOAD Feb 9 19:16:45.510000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:16:45.510000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:16:45.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.511000 audit: BPF prog-id=45 op=LOAD Feb 9 19:16:45.511000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:16:45.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.512000 audit: BPF prog-id=46 op=LOAD Feb 9 19:16:45.512000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit: BPF prog-id=47 op=LOAD Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.513000 audit: BPF prog-id=48 op=LOAD Feb 9 19:16:45.513000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:16:45.513000 audit: BPF prog-id=20 op=UNLOAD Feb 9 19:16:45.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.514000 audit: BPF prog-id=49 op=LOAD Feb 9 19:16:45.514000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:16:45.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.516000 audit: BPF prog-id=50 op=LOAD Feb 9 19:16:45.516000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit: BPF prog-id=51 op=LOAD Feb 9 19:16:45.518000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit: BPF prog-id=52 op=LOAD Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.519000 audit: BPF prog-id=53 op=LOAD Feb 9 19:16:45.519000 audit: BPF prog-id=30 op=UNLOAD Feb 9 19:16:45.519000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:16:45.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:45.543000 audit: BPF prog-id=54 op=LOAD Feb 9 19:16:45.543000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:16:45.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:45.559272 systemd[1]: Started kubelet.service. Feb 9 19:16:45.661267 kubelet[1569]: E0209 19:16:45.660692 1569 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 19:16:45.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:16:45.664073 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:16:45.664284 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:16:46.214215 env[1156]: time="2024-02-09T19:16:46.214117363Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 9 19:16:46.720107 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1975173059.mount: Deactivated successfully. Feb 9 19:16:48.887490 env[1156]: time="2024-02-09T19:16:48.887429176Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:48.892534 env[1156]: time="2024-02-09T19:16:48.892399639Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:48.894919 env[1156]: time="2024-02-09T19:16:48.894878416Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:48.898391 env[1156]: time="2024-02-09T19:16:48.898329588Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:48.899749 env[1156]: time="2024-02-09T19:16:48.899705875Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5\"" Feb 9 19:16:48.915048 env[1156]: time="2024-02-09T19:16:48.915001910Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 9 19:16:50.976731 env[1156]: time="2024-02-09T19:16:50.976657034Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:50.983722 env[1156]: time="2024-02-09T19:16:50.983663270Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:50.986256 env[1156]: time="2024-02-09T19:16:50.986205885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:50.989422 env[1156]: time="2024-02-09T19:16:50.989372040Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:50.990119 env[1156]: time="2024-02-09T19:16:50.990076475Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0\"" Feb 9 19:16:51.005360 env[1156]: time="2024-02-09T19:16:51.005311507Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 9 19:16:52.246487 env[1156]: time="2024-02-09T19:16:52.246415062Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:52.249355 env[1156]: time="2024-02-09T19:16:52.249310386Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:52.251943 env[1156]: time="2024-02-09T19:16:52.251880882Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:52.254294 env[1156]: time="2024-02-09T19:16:52.254253006Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:52.255451 env[1156]: time="2024-02-09T19:16:52.255395475Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975\"" Feb 9 19:16:52.270688 env[1156]: time="2024-02-09T19:16:52.270648243Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 9 19:16:53.290375 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount235436460.mount: Deactivated successfully. Feb 9 19:16:53.614038 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 9 19:16:53.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:53.621012 kernel: kauditd_printk_skb: 293 callbacks suppressed Feb 9 19:16:53.621119 kernel: audit: type=1131 audit(1707506213.613:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:53.661000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:16:53.661000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:16:53.676441 kernel: audit: type=1334 audit(1707506213.661:422): prog-id=41 op=UNLOAD Feb 9 19:16:53.676568 kernel: audit: type=1334 audit(1707506213.661:423): prog-id=40 op=UNLOAD Feb 9 19:16:53.676618 kernel: audit: type=1334 audit(1707506213.661:424): prog-id=39 op=UNLOAD Feb 9 19:16:53.661000 audit: BPF prog-id=39 op=UNLOAD Feb 9 19:16:53.979560 env[1156]: time="2024-02-09T19:16:53.979495906Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:53.983090 env[1156]: time="2024-02-09T19:16:53.983040238Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:53.985623 env[1156]: time="2024-02-09T19:16:53.985559509Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:53.987909 env[1156]: time="2024-02-09T19:16:53.987855103Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:53.988863 env[1156]: time="2024-02-09T19:16:53.988813400Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 9 19:16:54.003060 env[1156]: time="2024-02-09T19:16:54.003001621Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 19:16:54.354375 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2965490181.mount: Deactivated successfully. Feb 9 19:16:54.363166 env[1156]: time="2024-02-09T19:16:54.363105273Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:54.365777 env[1156]: time="2024-02-09T19:16:54.365727476Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:54.368232 env[1156]: time="2024-02-09T19:16:54.368188637Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:54.370205 env[1156]: time="2024-02-09T19:16:54.370164233Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:54.371027 env[1156]: time="2024-02-09T19:16:54.370974712Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 19:16:54.385804 env[1156]: time="2024-02-09T19:16:54.385758347Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 9 19:16:55.161649 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3345483130.mount: Deactivated successfully. Feb 9 19:16:55.678439 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 19:16:55.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:55.678768 systemd[1]: Stopped kubelet.service. Feb 9 19:16:55.700953 kernel: audit: type=1130 audit(1707506215.677:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:55.681375 systemd[1]: Started kubelet.service. Feb 9 19:16:55.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:55.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:55.744207 kernel: audit: type=1131 audit(1707506215.677:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:55.744342 kernel: audit: type=1130 audit(1707506215.680:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:55.767533 kubelet[1615]: E0209 19:16:55.767465 1615 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 19:16:55.771980 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:16:55.772206 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:16:55.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:16:55.795004 kernel: audit: type=1131 audit(1707506215.771:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:16:59.409748 env[1156]: time="2024-02-09T19:16:59.409659375Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:59.412767 env[1156]: time="2024-02-09T19:16:59.412714780Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:59.415311 env[1156]: time="2024-02-09T19:16:59.415264792Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:59.417820 env[1156]: time="2024-02-09T19:16:59.417771377Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:59.418872 env[1156]: time="2024-02-09T19:16:59.418815504Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Feb 9 19:16:59.434611 env[1156]: time="2024-02-09T19:16:59.434562795Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 19:16:59.825520 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4293800131.mount: Deactivated successfully. Feb 9 19:17:00.588765 env[1156]: time="2024-02-09T19:17:00.588672978Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:00.592001 env[1156]: time="2024-02-09T19:17:00.591949134Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:00.594562 env[1156]: time="2024-02-09T19:17:00.594504515Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:00.597136 env[1156]: time="2024-02-09T19:17:00.597090423Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:00.597962 env[1156]: time="2024-02-09T19:17:00.597900796Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 9 19:17:04.450061 systemd[1]: Stopped kubelet.service. Feb 9 19:17:04.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:04.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:04.484757 systemd[1]: Reloading. Feb 9 19:17:04.493952 kernel: audit: type=1130 audit(1707506224.449:429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:04.494102 kernel: audit: type=1131 audit(1707506224.450:430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:04.576863 /usr/lib/systemd/system-generators/torcx-generator[1708]: time="2024-02-09T19:17:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:17:04.582065 /usr/lib/systemd/system-generators/torcx-generator[1708]: time="2024-02-09T19:17:04Z" level=info msg="torcx already run" Feb 9 19:17:04.690145 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:17:04.690171 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:17:04.716238 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:17:04.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.822956 kernel: audit: type=1400 audit(1707506224.800:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.866361 kernel: audit: type=1400 audit(1707506224.800:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.866490 kernel: audit: type=1400 audit(1707506224.800:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.887533 kernel: audit: type=1400 audit(1707506224.800:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.908585 kernel: audit: type=1400 audit(1707506224.800:435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.908706 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:17:04.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.935054 kernel: audit: type=1400 audit(1707506224.800:436): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.935127 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:17:04.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.821000 audit: BPF prog-id=55 op=LOAD Feb 9 19:17:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.821000 audit: BPF prog-id=56 op=LOAD Feb 9 19:17:04.821000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:17:04.821000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:17:04.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.844000 audit: BPF prog-id=57 op=LOAD Feb 9 19:17:04.844000 audit: BPF prog-id=42 op=UNLOAD Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit: BPF prog-id=58 op=LOAD Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.865000 audit: BPF prog-id=59 op=LOAD Feb 9 19:17:04.865000 audit: BPF prog-id=43 op=UNLOAD Feb 9 19:17:04.865000 audit: BPF prog-id=44 op=UNLOAD Feb 9 19:17:04.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.886000 audit: BPF prog-id=60 op=LOAD Feb 9 19:17:04.886000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:17:04.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit: BPF prog-id=61 op=LOAD Feb 9 19:17:04.941000 audit: BPF prog-id=46 op=UNLOAD Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit: BPF prog-id=62 op=LOAD Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.941000 audit: BPF prog-id=63 op=LOAD Feb 9 19:17:04.941000 audit: BPF prog-id=47 op=UNLOAD Feb 9 19:17:04.941000 audit: BPF prog-id=48 op=UNLOAD Feb 9 19:17:04.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.943000 audit: BPF prog-id=64 op=LOAD Feb 9 19:17:04.943000 audit: BPF prog-id=49 op=UNLOAD Feb 9 19:17:04.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.944000 audit: BPF prog-id=65 op=LOAD Feb 9 19:17:04.944000 audit: BPF prog-id=50 op=UNLOAD Feb 9 19:17:04.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit: BPF prog-id=66 op=LOAD Feb 9 19:17:04.946000 audit: BPF prog-id=51 op=UNLOAD Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit: BPF prog-id=67 op=LOAD Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.946000 audit: BPF prog-id=68 op=LOAD Feb 9 19:17:04.946000 audit: BPF prog-id=52 op=UNLOAD Feb 9 19:17:04.946000 audit: BPF prog-id=53 op=UNLOAD Feb 9 19:17:04.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:04.948000 audit: BPF prog-id=69 op=LOAD Feb 9 19:17:04.948000 audit: BPF prog-id=54 op=UNLOAD Feb 9 19:17:04.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:04.968865 systemd[1]: Started kubelet.service. Feb 9 19:17:05.036480 kubelet[1752]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:17:05.036480 kubelet[1752]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 19:17:05.036480 kubelet[1752]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:17:05.037116 kubelet[1752]: I0209 19:17:05.036549 1752 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:17:05.439379 kubelet[1752]: I0209 19:17:05.439327 1752 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 19:17:05.439379 kubelet[1752]: I0209 19:17:05.439363 1752 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:17:05.439720 kubelet[1752]: I0209 19:17:05.439681 1752 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 19:17:05.445033 kubelet[1752]: E0209 19:17:05.445005 1752 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.97:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:05.445262 kubelet[1752]: I0209 19:17:05.445241 1752 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:17:05.450158 kubelet[1752]: I0209 19:17:05.450116 1752 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:17:05.450529 kubelet[1752]: I0209 19:17:05.450508 1752 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:17:05.450641 kubelet[1752]: I0209 19:17:05.450612 1752 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:17:05.450805 kubelet[1752]: I0209 19:17:05.450653 1752 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:17:05.450805 kubelet[1752]: I0209 19:17:05.450674 1752 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 19:17:05.450987 kubelet[1752]: I0209 19:17:05.450801 1752 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:17:05.454507 kubelet[1752]: I0209 19:17:05.454469 1752 kubelet.go:405] "Attempting to sync node with API server" Feb 9 19:17:05.454507 kubelet[1752]: I0209 19:17:05.454500 1752 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:17:05.454667 kubelet[1752]: I0209 19:17:05.454527 1752 kubelet.go:309] "Adding apiserver pod source" Feb 9 19:17:05.454667 kubelet[1752]: I0209 19:17:05.454548 1752 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:17:05.456883 kubelet[1752]: I0209 19:17:05.456862 1752 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:17:05.458697 kubelet[1752]: W0209 19:17:05.458647 1752 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.97:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:05.458851 kubelet[1752]: E0209 19:17:05.458833 1752 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.97:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:05.459108 kubelet[1752]: W0209 19:17:05.459064 1752 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.97:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:05.459225 kubelet[1752]: E0209 19:17:05.459211 1752 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.97:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:05.463373 kubelet[1752]: W0209 19:17:05.463350 1752 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:17:05.464194 kubelet[1752]: I0209 19:17:05.464173 1752 server.go:1168] "Started kubelet" Feb 9 19:17:05.466806 kubelet[1752]: E0209 19:17:05.466378 1752 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal.17b247dd848ef166", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", UID:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 17, 5, 464144230, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 17, 5, 464144230, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.128.0.97:6443/api/v1/namespaces/default/events": dial tcp 10.128.0.97:6443: connect: connection refused'(may retry after sleeping) Feb 9 19:17:05.466806 kubelet[1752]: I0209 19:17:05.466559 1752 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 19:17:05.467102 kubelet[1752]: I0209 19:17:05.467080 1752 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:17:05.468021 kubelet[1752]: I0209 19:17:05.467995 1752 server.go:461] "Adding debug handlers to kubelet server" Feb 9 19:17:05.467000 audit[1752]: AVC avc: denied { mac_admin } for pid=1752 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:05.467000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:17:05.467000 audit[1752]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c96ed0 a1=c000c94678 a2=c000c96ea0 a3=25 items=0 ppid=1 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:05.467000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:17:05.467000 audit[1752]: AVC avc: denied { mac_admin } for pid=1752 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:05.467000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:17:05.467000 audit[1752]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c9e2e0 a1=c000c94690 a2=c000c96f60 a3=25 items=0 ppid=1 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:05.467000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:17:05.469236 kubelet[1752]: I0209 19:17:05.468436 1752 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:17:05.469236 kubelet[1752]: I0209 19:17:05.468496 1752 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:17:05.469236 kubelet[1752]: I0209 19:17:05.468583 1752 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:17:05.470792 kubelet[1752]: E0209 19:17:05.470769 1752 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:17:05.470963 kubelet[1752]: E0209 19:17:05.470925 1752 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:17:05.472000 audit[1762]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:05.472000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd0010d6f0 a2=0 a3=7ffd0010d6dc items=0 ppid=1752 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:05.472000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:17:05.474000 audit[1763]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:05.474000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb7d113a0 a2=0 a3=7ffeb7d1138c items=0 ppid=1752 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:05.474000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:17:05.477833 kubelet[1752]: I0209 19:17:05.477751 1752 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 19:17:05.478473 kubelet[1752]: E0209 19:17:05.478450 1752 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.97:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.97:6443: connect: connection refused" interval="200ms" Feb 9 19:17:05.479000 audit[1765]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:05.479000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffce55d0cd0 a2=0 a3=7ffce55d0cbc items=0 ppid=1752 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:05.479000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:17:05.482190 kubelet[1752]: I0209 19:17:05.482157 1752 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 19:17:05.482000 audit[1767]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:05.482000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc906c5720 a2=0 a3=7ffc906c570c items=0 ppid=1752 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:05.482000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:17:05.492000 audit[1770]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:05.492000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffb1da10f0 a2=0 a3=7fffb1da10dc items=0 ppid=1752 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:05.492000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:17:05.493578 kubelet[1752]: I0209 19:17:05.493508 1752 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:17:05.494000 audit[1771]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:05.494000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffccbb59120 a2=0 a3=7ffccbb5910c items=0 ppid=1752 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:05.494000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:17:05.495345 kubelet[1752]: I0209 19:17:05.495264 1752 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:17:05.495345 kubelet[1752]: I0209 19:17:05.495285 1752 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 19:17:05.495345 kubelet[1752]: I0209 19:17:05.495319 1752 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 19:17:05.495585 kubelet[1752]: E0209 19:17:05.495400 1752 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:17:05.496000 audit[1773]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:05.496000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe260cd340 a2=0 a3=7ffe260cd32c items=0 ppid=1752 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:05.496000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:17:05.497000 audit[1774]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:05.497000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2cf2f630 a2=0 a3=7ffe2cf2f61c items=0 ppid=1752 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:05.497000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:17:05.498000 audit[1775]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:05.498000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb5e22c30 a2=0 a3=7ffdb5e22c1c items=0 ppid=1752 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:05.498000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:17:05.500000 audit[1776]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:05.500000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2d336a10 a2=0 a3=7fff2d3369fc items=0 ppid=1752 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:05.500000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:17:05.501000 audit[1777]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:05.501000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc2a85f120 a2=0 a3=7ffc2a85f10c items=0 ppid=1752 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:05.501000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:17:05.502000 audit[1778]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:05.502000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc76e580c0 a2=0 a3=7ffc76e580ac items=0 ppid=1752 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:05.502000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:17:05.504505 kubelet[1752]: W0209 19:17:05.504437 1752 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.97:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:05.504505 kubelet[1752]: E0209 19:17:05.504496 1752 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.97:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:05.513236 kubelet[1752]: W0209 19:17:05.513181 1752 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.97:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:05.514295 kubelet[1752]: E0209 19:17:05.514268 1752 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.97:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:05.524860 kubelet[1752]: I0209 19:17:05.524815 1752 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:17:05.524860 kubelet[1752]: I0209 19:17:05.524839 1752 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:17:05.524860 kubelet[1752]: I0209 19:17:05.524861 1752 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:17:05.527892 kubelet[1752]: I0209 19:17:05.527855 1752 policy_none.go:49] "None policy: Start" Feb 9 19:17:05.528723 kubelet[1752]: I0209 19:17:05.528689 1752 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:17:05.528723 kubelet[1752]: I0209 19:17:05.528723 1752 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:17:05.536188 systemd[1]: Created slice kubepods.slice. Feb 9 19:17:05.542234 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:17:05.546161 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:17:05.556027 kubelet[1752]: I0209 19:17:05.555994 1752 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:17:05.555000 audit[1752]: AVC avc: denied { mac_admin } for pid=1752 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:05.555000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:17:05.555000 audit[1752]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009efb00 a1=c000ec1170 a2=c0009efad0 a3=25 items=0 ppid=1 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:05.555000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:17:05.556546 kubelet[1752]: I0209 19:17:05.556123 1752 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:17:05.556546 kubelet[1752]: I0209 19:17:05.556484 1752 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:17:05.558785 kubelet[1752]: E0209 19:17:05.558455 1752 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" not found" Feb 9 19:17:05.584033 kubelet[1752]: I0209 19:17:05.583990 1752 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:05.584422 kubelet[1752]: E0209 19:17:05.584396 1752 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.97:6443/api/v1/nodes\": dial tcp 10.128.0.97:6443: connect: connection refused" node="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:05.595609 kubelet[1752]: I0209 19:17:05.595553 1752 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:17:05.601092 kubelet[1752]: I0209 19:17:05.601058 1752 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:17:05.607187 kubelet[1752]: I0209 19:17:05.607160 1752 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:17:05.613208 systemd[1]: Created slice kubepods-burstable-pod0c9e25a1e01135844ad6ab8fb3395a78.slice. Feb 9 19:17:05.626979 systemd[1]: Created slice kubepods-burstable-podd43acd53fe4700344bdbdc19001ed64b.slice. Feb 9 19:17:05.637183 systemd[1]: Created slice kubepods-burstable-pod23a85b84dc7d0bd6d38314fd36bdbc89.slice. Feb 9 19:17:05.679357 kubelet[1752]: E0209 19:17:05.679220 1752 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.97:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.97:6443: connect: connection refused" interval="400ms" Feb 9 19:17:05.683756 kubelet[1752]: I0209 19:17:05.683699 1752 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0c9e25a1e01135844ad6ab8fb3395a78-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"0c9e25a1e01135844ad6ab8fb3395a78\") " pod="kube-system/kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:05.683756 kubelet[1752]: I0209 19:17:05.683757 1752 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0c9e25a1e01135844ad6ab8fb3395a78-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"0c9e25a1e01135844ad6ab8fb3395a78\") " pod="kube-system/kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:05.684035 kubelet[1752]: I0209 19:17:05.683797 1752 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d43acd53fe4700344bdbdc19001ed64b-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"d43acd53fe4700344bdbdc19001ed64b\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:05.684035 kubelet[1752]: I0209 19:17:05.683836 1752 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d43acd53fe4700344bdbdc19001ed64b-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"d43acd53fe4700344bdbdc19001ed64b\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:05.684035 kubelet[1752]: I0209 19:17:05.683871 1752 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d43acd53fe4700344bdbdc19001ed64b-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"d43acd53fe4700344bdbdc19001ed64b\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:05.684035 kubelet[1752]: I0209 19:17:05.683907 1752 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/23a85b84dc7d0bd6d38314fd36bdbc89-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"23a85b84dc7d0bd6d38314fd36bdbc89\") " pod="kube-system/kube-scheduler-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:05.684271 kubelet[1752]: I0209 19:17:05.683972 1752 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0c9e25a1e01135844ad6ab8fb3395a78-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"0c9e25a1e01135844ad6ab8fb3395a78\") " pod="kube-system/kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:05.684271 kubelet[1752]: I0209 19:17:05.684009 1752 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d43acd53fe4700344bdbdc19001ed64b-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"d43acd53fe4700344bdbdc19001ed64b\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:05.684271 kubelet[1752]: I0209 19:17:05.684051 1752 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d43acd53fe4700344bdbdc19001ed64b-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"d43acd53fe4700344bdbdc19001ed64b\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:05.789976 kubelet[1752]: I0209 19:17:05.789795 1752 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:05.793513 kubelet[1752]: E0209 19:17:05.793486 1752 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.97:6443/api/v1/nodes\": dial tcp 10.128.0.97:6443: connect: connection refused" node="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:05.924249 env[1156]: time="2024-02-09T19:17:05.924166737Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal,Uid:0c9e25a1e01135844ad6ab8fb3395a78,Namespace:kube-system,Attempt:0,}" Feb 9 19:17:05.931079 env[1156]: time="2024-02-09T19:17:05.931023036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal,Uid:d43acd53fe4700344bdbdc19001ed64b,Namespace:kube-system,Attempt:0,}" Feb 9 19:17:05.942297 env[1156]: time="2024-02-09T19:17:05.942238556Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal,Uid:23a85b84dc7d0bd6d38314fd36bdbc89,Namespace:kube-system,Attempt:0,}" Feb 9 19:17:06.080847 kubelet[1752]: E0209 19:17:06.080400 1752 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.97:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.97:6443: connect: connection refused" interval="800ms" Feb 9 19:17:06.199717 kubelet[1752]: I0209 19:17:06.199670 1752 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:06.260823 kubelet[1752]: E0209 19:17:06.200141 1752 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.97:6443/api/v1/nodes\": dial tcp 10.128.0.97:6443: connect: connection refused" node="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:06.444901 kubelet[1752]: W0209 19:17:06.444811 1752 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.97:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:06.444901 kubelet[1752]: E0209 19:17:06.444870 1752 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.97:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:06.716700 kubelet[1752]: W0209 19:17:06.716513 1752 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.97:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:06.716700 kubelet[1752]: E0209 19:17:06.716604 1752 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.97:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:06.881729 kubelet[1752]: E0209 19:17:06.881686 1752 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.97:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.97:6443: connect: connection refused" interval="1.6s" Feb 9 19:17:06.958964 kubelet[1752]: W0209 19:17:06.958842 1752 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.97:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:06.959158 kubelet[1752]: E0209 19:17:06.958981 1752 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.97:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:06.995026 kubelet[1752]: W0209 19:17:06.994827 1752 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.97:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:06.995026 kubelet[1752]: E0209 19:17:06.994885 1752 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.97:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:07.008202 kubelet[1752]: I0209 19:17:07.007804 1752 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:07.008202 kubelet[1752]: E0209 19:17:07.008168 1752 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.97:6443/api/v1/nodes\": dial tcp 10.128.0.97:6443: connect: connection refused" node="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:07.529200 kubelet[1752]: E0209 19:17:07.529148 1752 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.97:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:07.777448 update_engine[1139]: I0209 19:17:07.777042 1139 update_attempter.cc:509] Updating boot flags... Feb 9 19:17:08.482769 kubelet[1752]: E0209 19:17:08.482718 1752 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.97:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.97:6443: connect: connection refused" interval="3.2s" Feb 9 19:17:08.613349 kubelet[1752]: I0209 19:17:08.613300 1752 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:08.614019 kubelet[1752]: E0209 19:17:08.613676 1752 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.97:6443/api/v1/nodes\": dial tcp 10.128.0.97:6443: connect: connection refused" node="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:08.738562 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3352926334.mount: Deactivated successfully. Feb 9 19:17:08.746524 env[1156]: time="2024-02-09T19:17:08.746470232Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:08.748306 env[1156]: time="2024-02-09T19:17:08.748261167Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:08.751844 env[1156]: time="2024-02-09T19:17:08.751805705Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:08.753469 env[1156]: time="2024-02-09T19:17:08.753415948Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:08.754705 env[1156]: time="2024-02-09T19:17:08.754654179Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:08.757349 env[1156]: time="2024-02-09T19:17:08.757311452Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:08.759452 env[1156]: time="2024-02-09T19:17:08.759401892Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:08.760494 env[1156]: time="2024-02-09T19:17:08.760442565Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:08.761801 env[1156]: time="2024-02-09T19:17:08.761732672Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:08.763620 env[1156]: time="2024-02-09T19:17:08.763560734Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:08.764516 env[1156]: time="2024-02-09T19:17:08.764443377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:08.765385 env[1156]: time="2024-02-09T19:17:08.765351282Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:08.801886 env[1156]: time="2024-02-09T19:17:08.801789576Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:17:08.801886 env[1156]: time="2024-02-09T19:17:08.801849800Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:17:08.802268 env[1156]: time="2024-02-09T19:17:08.801868331Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:17:08.802721 env[1156]: time="2024-02-09T19:17:08.802614891Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7e556816701e765b82168910f2a017821cfddddf0d30239e8b4319f6c7018fb1 pid=1809 runtime=io.containerd.runc.v2 Feb 9 19:17:08.842592 systemd[1]: Started cri-containerd-7e556816701e765b82168910f2a017821cfddddf0d30239e8b4319f6c7018fb1.scope. Feb 9 19:17:08.844739 env[1156]: time="2024-02-09T19:17:08.844659654Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:17:08.845017 env[1156]: time="2024-02-09T19:17:08.844971535Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:17:08.845199 env[1156]: time="2024-02-09T19:17:08.845162378Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:17:08.845668 env[1156]: time="2024-02-09T19:17:08.845609284Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4904bb11162abffd10506ff415d71daf263b57322439ef17759fa73e972bc040 pid=1834 runtime=io.containerd.runc.v2 Feb 9 19:17:08.854832 env[1156]: time="2024-02-09T19:17:08.852581295Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:17:08.854832 env[1156]: time="2024-02-09T19:17:08.852656600Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:17:08.854832 env[1156]: time="2024-02-09T19:17:08.852703396Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:17:08.854832 env[1156]: time="2024-02-09T19:17:08.853182585Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f3b9d1878deb82178f919b29fbb3a509ce3ed65112bd453d8784a68e97661217 pid=1840 runtime=io.containerd.runc.v2 Feb 9 19:17:08.877007 systemd[1]: Started cri-containerd-4904bb11162abffd10506ff415d71daf263b57322439ef17759fa73e972bc040.scope. Feb 9 19:17:08.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.894000 audit: BPF prog-id=70 op=LOAD Feb 9 19:17:08.895000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.895000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1809 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:08.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765353536383136373031653736356238323136383931306632613031 Feb 9 19:17:08.895000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.895000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1809 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:08.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765353536383136373031653736356238323136383931306632613031 Feb 9 19:17:08.896000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.896000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.896000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.896000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.896000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.896000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.896000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.896000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.896000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.896000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.896000 audit: BPF prog-id=71 op=LOAD Feb 9 19:17:08.896000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e60b0 items=0 ppid=1809 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:08.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765353536383136373031653736356238323136383931306632613031 Feb 9 19:17:08.897000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.897000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.897000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.897000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.897000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.897000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.897000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.897000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.897000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.897000 audit: BPF prog-id=72 op=LOAD Feb 9 19:17:08.897000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e60f8 items=0 ppid=1809 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:08.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765353536383136373031653736356238323136383931306632613031 Feb 9 19:17:08.899000 audit: BPF prog-id=72 op=UNLOAD Feb 9 19:17:08.899000 audit: BPF prog-id=71 op=UNLOAD Feb 9 19:17:08.899000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.899000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.899000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.899000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.899000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.899000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.899000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.899000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.899000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.899000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.899000 audit: BPF prog-id=73 op=LOAD Feb 9 19:17:08.899000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e6508 items=0 ppid=1809 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:08.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765353536383136373031653736356238323136383931306632613031 Feb 9 19:17:08.906976 systemd[1]: Started cri-containerd-f3b9d1878deb82178f919b29fbb3a509ce3ed65112bd453d8784a68e97661217.scope. Feb 9 19:17:08.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.922000 audit: BPF prog-id=74 op=LOAD Feb 9 19:17:08.923000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.923000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1834 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:08.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439303462623131313632616266666431303530366666343135643731 Feb 9 19:17:08.924000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.924000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1834 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:08.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439303462623131313632616266666431303530366666343135643731 Feb 9 19:17:08.924000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.924000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.924000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.924000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.924000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.924000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.924000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.924000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.924000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.924000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.924000 audit: BPF prog-id=75 op=LOAD Feb 9 19:17:08.924000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002cbdd0 items=0 ppid=1834 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:08.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439303462623131313632616266666431303530366666343135643731 Feb 9 19:17:08.926000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.926000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.926000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.926000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.926000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.926000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.926000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.926000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.926000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.926000 audit: BPF prog-id=76 op=LOAD Feb 9 19:17:08.926000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002cbe18 items=0 ppid=1834 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:08.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439303462623131313632616266666431303530366666343135643731 Feb 9 19:17:08.927000 audit: BPF prog-id=76 op=UNLOAD Feb 9 19:17:08.927000 audit: BPF prog-id=75 op=UNLOAD Feb 9 19:17:08.927000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.927000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.927000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.927000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.927000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.927000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.927000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.927000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.927000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.927000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.927000 audit: BPF prog-id=77 op=LOAD Feb 9 19:17:08.927000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00034c228 items=0 ppid=1834 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:08.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439303462623131313632616266666431303530366666343135643731 Feb 9 19:17:08.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.945000 audit: BPF prog-id=78 op=LOAD Feb 9 19:17:08.946000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.946000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1840 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:08.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633623964313837386465623832313738663931396232396662623361 Feb 9 19:17:08.946000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.946000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1840 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:08.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633623964313837386465623832313738663931396232396662623361 Feb 9 19:17:08.947000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.947000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.947000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.947000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.947000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.947000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.947000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.947000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.947000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.947000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.947000 audit: BPF prog-id=79 op=LOAD Feb 9 19:17:08.947000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001ca2e0 items=0 ppid=1840 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:08.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633623964313837386465623832313738663931396232396662623361 Feb 9 19:17:08.948000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.948000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.948000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.948000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.948000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.948000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.948000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.948000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.948000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.948000 audit: BPF prog-id=80 op=LOAD Feb 9 19:17:08.948000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001ca328 items=0 ppid=1840 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:08.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633623964313837386465623832313738663931396232396662623361 Feb 9 19:17:08.949000 audit: BPF prog-id=80 op=UNLOAD Feb 9 19:17:08.949000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:17:08.949000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.949000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.949000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.949000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.949000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.949000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.949000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.949000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.949000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.949000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:08.949000 audit: BPF prog-id=81 op=LOAD Feb 9 19:17:08.949000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001ca738 items=0 ppid=1840 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:08.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633623964313837386465623832313738663931396232396662623361 Feb 9 19:17:08.959383 kubelet[1752]: W0209 19:17:08.959302 1752 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.97:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:08.959520 kubelet[1752]: E0209 19:17:08.959390 1752 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.97:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:09.003202 env[1156]: time="2024-02-09T19:17:08.995869150Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal,Uid:23a85b84dc7d0bd6d38314fd36bdbc89,Namespace:kube-system,Attempt:0,} returns sandbox id \"7e556816701e765b82168910f2a017821cfddddf0d30239e8b4319f6c7018fb1\"" Feb 9 19:17:09.009603 kubelet[1752]: E0209 19:17:09.009062 1752 kubelet_pods.go:414] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-21291" Feb 9 19:17:09.012550 env[1156]: time="2024-02-09T19:17:09.012489492Z" level=info msg="CreateContainer within sandbox \"7e556816701e765b82168910f2a017821cfddddf0d30239e8b4319f6c7018fb1\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 19:17:09.024894 env[1156]: time="2024-02-09T19:17:09.024812517Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal,Uid:d43acd53fe4700344bdbdc19001ed64b,Namespace:kube-system,Attempt:0,} returns sandbox id \"4904bb11162abffd10506ff415d71daf263b57322439ef17759fa73e972bc040\"" Feb 9 19:17:09.027228 kubelet[1752]: E0209 19:17:09.027189 1752 kubelet_pods.go:414] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flat" Feb 9 19:17:09.029286 env[1156]: time="2024-02-09T19:17:09.029151527Z" level=info msg="CreateContainer within sandbox \"4904bb11162abffd10506ff415d71daf263b57322439ef17759fa73e972bc040\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 19:17:09.042732 env[1156]: time="2024-02-09T19:17:09.042654251Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal,Uid:0c9e25a1e01135844ad6ab8fb3395a78,Namespace:kube-system,Attempt:0,} returns sandbox id \"f3b9d1878deb82178f919b29fbb3a509ce3ed65112bd453d8784a68e97661217\"" Feb 9 19:17:09.044382 kubelet[1752]: E0209 19:17:09.044352 1752 kubelet_pods.go:414] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-21291" Feb 9 19:17:09.047179 env[1156]: time="2024-02-09T19:17:09.047134087Z" level=info msg="CreateContainer within sandbox \"f3b9d1878deb82178f919b29fbb3a509ce3ed65112bd453d8784a68e97661217\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 19:17:09.051867 env[1156]: time="2024-02-09T19:17:09.051818692Z" level=info msg="CreateContainer within sandbox \"7e556816701e765b82168910f2a017821cfddddf0d30239e8b4319f6c7018fb1\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"ab0451874b990b3535f6a27fad00033729c43ab7077a11fdf1cc40af5a5b047f\"" Feb 9 19:17:09.052633 env[1156]: time="2024-02-09T19:17:09.052594113Z" level=info msg="StartContainer for \"ab0451874b990b3535f6a27fad00033729c43ab7077a11fdf1cc40af5a5b047f\"" Feb 9 19:17:09.057432 env[1156]: time="2024-02-09T19:17:09.057386864Z" level=info msg="CreateContainer within sandbox \"4904bb11162abffd10506ff415d71daf263b57322439ef17759fa73e972bc040\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"2f519beb8a7e1245efef219e5051f47827fd3b22aee6c8228a43db575d5bd8ac\"" Feb 9 19:17:09.057907 env[1156]: time="2024-02-09T19:17:09.057869316Z" level=info msg="StartContainer for \"2f519beb8a7e1245efef219e5051f47827fd3b22aee6c8228a43db575d5bd8ac\"" Feb 9 19:17:09.074103 env[1156]: time="2024-02-09T19:17:09.074037310Z" level=info msg="CreateContainer within sandbox \"f3b9d1878deb82178f919b29fbb3a509ce3ed65112bd453d8784a68e97661217\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"6a4a38630ed46e033b1681bd58c36d39ba838af005ea122bb91a4f996a6eefec\"" Feb 9 19:17:09.074673 env[1156]: time="2024-02-09T19:17:09.074629535Z" level=info msg="StartContainer for \"6a4a38630ed46e033b1681bd58c36d39ba838af005ea122bb91a4f996a6eefec\"" Feb 9 19:17:09.090115 systemd[1]: Started cri-containerd-2f519beb8a7e1245efef219e5051f47827fd3b22aee6c8228a43db575d5bd8ac.scope. Feb 9 19:17:09.099544 systemd[1]: Started cri-containerd-ab0451874b990b3535f6a27fad00033729c43ab7077a11fdf1cc40af5a5b047f.scope. Feb 9 19:17:09.135382 systemd[1]: Started cri-containerd-6a4a38630ed46e033b1681bd58c36d39ba838af005ea122bb91a4f996a6eefec.scope. Feb 9 19:17:09.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.142000 audit: BPF prog-id=82 op=LOAD Feb 9 19:17:09.144000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.144000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1834 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:09.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353139626562386137653132343565666566323139653530353166 Feb 9 19:17:09.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.145000 audit: BPF prog-id=83 op=LOAD Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1809 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:09.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162303435313837346239393062333533356636613237666164303030 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1809 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:09.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162303435313837346239393062333533356636613237666164303030 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit: BPF prog-id=84 op=LOAD Feb 9 19:17:09.146000 audit[1938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003b89c0 items=0 ppid=1809 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:09.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162303435313837346239393062333533356636613237666164303030 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit: BPF prog-id=85 op=LOAD Feb 9 19:17:09.146000 audit[1938]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003b8a08 items=0 ppid=1809 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:09.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162303435313837346239393062333533356636613237666164303030 Feb 9 19:17:09.146000 audit: BPF prog-id=85 op=UNLOAD Feb 9 19:17:09.146000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.146000 audit: BPF prog-id=86 op=LOAD Feb 9 19:17:09.146000 audit[1938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b8e18 items=0 ppid=1809 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:09.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162303435313837346239393062333533356636613237666164303030 Feb 9 19:17:09.151000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.151000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1834 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:09.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353139626562386137653132343565666566323139653530353166 Feb 9 19:17:09.152000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.152000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.152000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.152000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.152000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.152000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.152000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.152000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.152000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.152000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.152000 audit: BPF prog-id=87 op=LOAD Feb 9 19:17:09.152000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002fc0e0 items=0 ppid=1834 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:09.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353139626562386137653132343565666566323139653530353166 Feb 9 19:17:09.154000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.154000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.154000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.154000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.154000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.154000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.154000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.154000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.154000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.154000 audit: BPF prog-id=88 op=LOAD Feb 9 19:17:09.154000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002fc128 items=0 ppid=1834 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:09.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353139626562386137653132343565666566323139653530353166 Feb 9 19:17:09.155000 audit: BPF prog-id=88 op=UNLOAD Feb 9 19:17:09.155000 audit: BPF prog-id=87 op=UNLOAD Feb 9 19:17:09.155000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.155000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.155000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.155000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.155000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.155000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.155000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.155000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.155000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.155000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.155000 audit: BPF prog-id=89 op=LOAD Feb 9 19:17:09.155000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002fc538 items=0 ppid=1834 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:09.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353139626562386137653132343565666566323139653530353166 Feb 9 19:17:09.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.192000 audit: BPF prog-id=90 op=LOAD Feb 9 19:17:09.193000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.193000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:09.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661346133383633306564343665303333623136383162643538633336 Feb 9 19:17:09.193000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.193000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:09.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661346133383633306564343665303333623136383162643538633336 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit: BPF prog-id=91 op=LOAD Feb 9 19:17:09.194000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000321440 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:09.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661346133383633306564343665303333623136383162643538633336 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit: BPF prog-id=92 op=LOAD Feb 9 19:17:09.194000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000321488 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:09.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661346133383633306564343665303333623136383162643538633336 Feb 9 19:17:09.194000 audit: BPF prog-id=92 op=UNLOAD Feb 9 19:17:09.194000 audit: BPF prog-id=91 op=UNLOAD Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:09.194000 audit: BPF prog-id=93 op=LOAD Feb 9 19:17:09.194000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000321898 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:09.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661346133383633306564343665303333623136383162643538633336 Feb 9 19:17:09.225160 env[1156]: time="2024-02-09T19:17:09.225107315Z" level=info msg="StartContainer for \"ab0451874b990b3535f6a27fad00033729c43ab7077a11fdf1cc40af5a5b047f\" returns successfully" Feb 9 19:17:09.253471 env[1156]: time="2024-02-09T19:17:09.253344398Z" level=info msg="StartContainer for \"2f519beb8a7e1245efef219e5051f47827fd3b22aee6c8228a43db575d5bd8ac\" returns successfully" Feb 9 19:17:09.265289 kubelet[1752]: W0209 19:17:09.265118 1752 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.97:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:09.265289 kubelet[1752]: E0209 19:17:09.265232 1752 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.97:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:09.275498 env[1156]: time="2024-02-09T19:17:09.275425429Z" level=info msg="StartContainer for \"6a4a38630ed46e033b1681bd58c36d39ba838af005ea122bb91a4f996a6eefec\" returns successfully" Feb 9 19:17:09.291449 kubelet[1752]: W0209 19:17:09.291309 1752 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.97:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:09.291449 kubelet[1752]: E0209 19:17:09.291394 1752 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.97:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.97:6443: connect: connection refused Feb 9 19:17:11.587149 kernel: kauditd_printk_skb: 557 callbacks suppressed Feb 9 19:17:11.587366 kernel: audit: type=1400 audit(1707506231.575:726): avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:11.575000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:11.575000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c46a20 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:17:11.655043 kernel: audit: type=1300 audit(1707506231.575:726): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c46a20 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:17:11.575000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:11.690996 kernel: audit: type=1327 audit(1707506231.575:726): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:11.575000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:11.575000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000152bc0 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:17:11.757817 kernel: audit: type=1400 audit(1707506231.575:727): avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:11.757979 kernel: audit: type=1300 audit(1707506231.575:727): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000152bc0 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:17:11.575000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:11.791036 kernel: audit: type=1327 audit(1707506231.575:727): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:11.820345 kubelet[1752]: I0209 19:17:11.820310 1752 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:12.915000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:12.943967 kernel: audit: type=1400 audit(1707506232.915:728): avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:12.915000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c009d8d650 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:17:12.984004 kernel: audit: type=1300 audit(1707506232.915:728): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c009d8d650 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:17:12.915000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:17:13.012960 kernel: audit: type=1327 audit(1707506232.915:728): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:17:12.915000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:13.038985 kernel: audit: type=1400 audit(1707506232.915:729): avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:12.915000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00669eb20 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:17:12.915000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:17:12.916000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:12.916000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c009d8d770 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:17:12.916000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:17:12.957000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:12.957000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c003bed260 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:17:12.957000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:17:12.970000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:12.970000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00350da00 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:17:12.970000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:17:12.970000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:12.970000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00484b830 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:17:12.970000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:17:13.172317 kubelet[1752]: E0209 19:17:13.172257 1752 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" not found" node="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:13.216572 kubelet[1752]: I0209 19:17:13.216445 1752 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:13.287434 kubelet[1752]: E0209 19:17:13.287295 1752 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal.17b247dd848ef166", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", UID:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 17, 5, 464144230, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 17, 5, 464144230, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 19:17:13.460866 kubelet[1752]: I0209 19:17:13.460595 1752 apiserver.go:52] "Watching apiserver" Feb 9 19:17:13.483262 kubelet[1752]: I0209 19:17:13.483116 1752 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 19:17:13.575539 kubelet[1752]: I0209 19:17:13.575492 1752 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:17:14.332219 kubelet[1752]: W0209 19:17:14.332182 1752 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Feb 9 19:17:14.452628 kubelet[1752]: W0209 19:17:14.452574 1752 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Feb 9 19:17:15.577889 kubelet[1752]: I0209 19:17:15.577849 1752 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" podStartSLOduration=1.577790635 podCreationTimestamp="2024-02-09 19:17:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:17:15.54598569 +0000 UTC m=+10.571503106" watchObservedRunningTime="2024-02-09 19:17:15.577790635 +0000 UTC m=+10.603308052" Feb 9 19:17:15.662537 systemd[1]: Reloading. Feb 9 19:17:15.794799 /usr/lib/systemd/system-generators/torcx-generator[2059]: time="2024-02-09T19:17:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:17:15.799068 /usr/lib/systemd/system-generators/torcx-generator[2059]: time="2024-02-09T19:17:15Z" level=info msg="torcx already run" Feb 9 19:17:15.885487 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:17:15.885514 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:17:15.912841 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:17:16.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.018000 audit: BPF prog-id=94 op=LOAD Feb 9 19:17:16.018000 audit: BPF prog-id=78 op=UNLOAD Feb 9 19:17:16.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.019000 audit: BPF prog-id=95 op=LOAD Feb 9 19:17:16.019000 audit: BPF prog-id=74 op=UNLOAD Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit: BPF prog-id=96 op=LOAD Feb 9 19:17:16.021000 audit: BPF prog-id=90 op=UNLOAD Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit: BPF prog-id=97 op=LOAD Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.022000 audit: BPF prog-id=98 op=LOAD Feb 9 19:17:16.022000 audit: BPF prog-id=55 op=UNLOAD Feb 9 19:17:16.022000 audit: BPF prog-id=56 op=UNLOAD Feb 9 19:17:16.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.024000 audit: BPF prog-id=99 op=LOAD Feb 9 19:17:16.024000 audit: BPF prog-id=70 op=UNLOAD Feb 9 19:17:16.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.025000 audit: BPF prog-id=100 op=LOAD Feb 9 19:17:16.025000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:17:16.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.027000 audit: BPF prog-id=101 op=LOAD Feb 9 19:17:16.027000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit: BPF prog-id=102 op=LOAD Feb 9 19:17:16.029000 audit: BPF prog-id=57 op=UNLOAD Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit: BPF prog-id=103 op=LOAD Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.029000 audit: BPF prog-id=104 op=LOAD Feb 9 19:17:16.029000 audit: BPF prog-id=58 op=UNLOAD Feb 9 19:17:16.029000 audit: BPF prog-id=59 op=UNLOAD Feb 9 19:17:16.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.030000 audit: BPF prog-id=105 op=LOAD Feb 9 19:17:16.030000 audit: BPF prog-id=60 op=UNLOAD Feb 9 19:17:16.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.032000 audit: BPF prog-id=106 op=LOAD Feb 9 19:17:16.032000 audit: BPF prog-id=61 op=UNLOAD Feb 9 19:17:16.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit: BPF prog-id=107 op=LOAD Feb 9 19:17:16.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.033000 audit: BPF prog-id=108 op=LOAD Feb 9 19:17:16.033000 audit: BPF prog-id=62 op=UNLOAD Feb 9 19:17:16.033000 audit: BPF prog-id=63 op=UNLOAD Feb 9 19:17:16.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.034000 audit: BPF prog-id=109 op=LOAD Feb 9 19:17:16.034000 audit: BPF prog-id=64 op=UNLOAD Feb 9 19:17:16.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.036000 audit: BPF prog-id=110 op=LOAD Feb 9 19:17:16.036000 audit: BPF prog-id=65 op=UNLOAD Feb 9 19:17:16.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit: BPF prog-id=111 op=LOAD Feb 9 19:17:16.038000 audit: BPF prog-id=66 op=UNLOAD Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit: BPF prog-id=112 op=LOAD Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.038000 audit: BPF prog-id=113 op=LOAD Feb 9 19:17:16.038000 audit: BPF prog-id=67 op=UNLOAD Feb 9 19:17:16.038000 audit: BPF prog-id=68 op=UNLOAD Feb 9 19:17:16.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.041000 audit: BPF prog-id=114 op=LOAD Feb 9 19:17:16.041000 audit: BPF prog-id=69 op=UNLOAD Feb 9 19:17:16.062988 kubelet[1752]: I0209 19:17:16.062788 1752 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:17:16.063365 systemd[1]: Stopping kubelet.service... Feb 9 19:17:16.080455 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 19:17:16.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:16.080687 systemd[1]: Stopped kubelet.service. Feb 9 19:17:16.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:16.083639 systemd[1]: Started kubelet.service. Feb 9 19:17:16.194025 kubelet[2103]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:17:16.194025 kubelet[2103]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 19:17:16.194025 kubelet[2103]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:17:16.194025 kubelet[2103]: I0209 19:17:16.193327 2103 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:17:16.202111 kubelet[2103]: I0209 19:17:16.202068 2103 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 19:17:16.202111 kubelet[2103]: I0209 19:17:16.202108 2103 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:17:16.202420 kubelet[2103]: I0209 19:17:16.202391 2103 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 19:17:16.205229 kubelet[2103]: I0209 19:17:16.205190 2103 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 19:17:16.209230 kubelet[2103]: I0209 19:17:16.209195 2103 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:17:16.216119 kubelet[2103]: I0209 19:17:16.216081 2103 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:17:16.216474 kubelet[2103]: I0209 19:17:16.216434 2103 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:17:16.216598 kubelet[2103]: I0209 19:17:16.216576 2103 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:17:16.216751 kubelet[2103]: I0209 19:17:16.216610 2103 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:17:16.216751 kubelet[2103]: I0209 19:17:16.216634 2103 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 19:17:16.216751 kubelet[2103]: I0209 19:17:16.216684 2103 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:17:16.223482 kubelet[2103]: I0209 19:17:16.223447 2103 kubelet.go:405] "Attempting to sync node with API server" Feb 9 19:17:16.223625 kubelet[2103]: I0209 19:17:16.223489 2103 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:17:16.223625 kubelet[2103]: I0209 19:17:16.223531 2103 kubelet.go:309] "Adding apiserver pod source" Feb 9 19:17:16.223625 kubelet[2103]: I0209 19:17:16.223564 2103 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:17:16.228110 kubelet[2103]: I0209 19:17:16.228079 2103 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:17:16.243820 kubelet[2103]: I0209 19:17:16.243780 2103 server.go:1168] "Started kubelet" Feb 9 19:17:16.247535 kubelet[2103]: E0209 19:17:16.247491 2103 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:17:16.247535 kubelet[2103]: E0209 19:17:16.247541 2103 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:17:16.255000 audit[2103]: AVC avc: denied { mac_admin } for pid=2103 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.255000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:17:16.255000 audit[2103]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d8b260 a1=c000e26b28 a2=c000d8b230 a3=25 items=0 ppid=1 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:16.255000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:17:16.255000 audit[2103]: AVC avc: denied { mac_admin } for pid=2103 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.255000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:17:16.255000 audit[2103]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0001b91e0 a1=c000e26b40 a2=c000d8b2f0 a3=25 items=0 ppid=1 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:16.255000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:17:16.257827 kubelet[2103]: I0209 19:17:16.257174 2103 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:17:16.257827 kubelet[2103]: I0209 19:17:16.257243 2103 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:17:16.257827 kubelet[2103]: I0209 19:17:16.257277 2103 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:17:16.268770 kubelet[2103]: I0209 19:17:16.268733 2103 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:17:16.269837 kubelet[2103]: I0209 19:17:16.269803 2103 server.go:461] "Adding debug handlers to kubelet server" Feb 9 19:17:16.272057 kubelet[2103]: I0209 19:17:16.272028 2103 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 19:17:16.275241 kubelet[2103]: I0209 19:17:16.275186 2103 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 19:17:16.278216 kubelet[2103]: I0209 19:17:16.278187 2103 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 19:17:16.349068 kubelet[2103]: I0209 19:17:16.349016 2103 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:17:16.358179 kubelet[2103]: I0209 19:17:16.356839 2103 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:17:16.358179 kubelet[2103]: I0209 19:17:16.356866 2103 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 19:17:16.358179 kubelet[2103]: I0209 19:17:16.356889 2103 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 19:17:16.358179 kubelet[2103]: E0209 19:17:16.356975 2103 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:17:16.381775 kubelet[2103]: I0209 19:17:16.381734 2103 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:16.432859 kubelet[2103]: I0209 19:17:16.432814 2103 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:16.433063 kubelet[2103]: I0209 19:17:16.432922 2103 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:16.457359 kubelet[2103]: E0209 19:17:16.457231 2103 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 19:17:16.463492 kubelet[2103]: I0209 19:17:16.463458 2103 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:17:16.463492 kubelet[2103]: I0209 19:17:16.463488 2103 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:17:16.463708 kubelet[2103]: I0209 19:17:16.463510 2103 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:17:16.463708 kubelet[2103]: I0209 19:17:16.463707 2103 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 19:17:16.463821 kubelet[2103]: I0209 19:17:16.463726 2103 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 19:17:16.463821 kubelet[2103]: I0209 19:17:16.463738 2103 policy_none.go:49] "None policy: Start" Feb 9 19:17:16.464819 kubelet[2103]: I0209 19:17:16.464789 2103 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:17:16.464923 kubelet[2103]: I0209 19:17:16.464824 2103 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:17:16.465061 kubelet[2103]: I0209 19:17:16.465039 2103 state_mem.go:75] "Updated machine memory state" Feb 9 19:17:16.470711 kubelet[2103]: I0209 19:17:16.470681 2103 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:17:16.469000 audit[2103]: AVC avc: denied { mac_admin } for pid=2103 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:16.469000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:17:16.469000 audit[2103]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000831920 a1=c000c106c0 a2=c0008318f0 a3=25 items=0 ppid=1 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:16.469000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:17:16.471178 kubelet[2103]: I0209 19:17:16.470792 2103 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:17:16.473946 kubelet[2103]: I0209 19:17:16.473900 2103 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:17:16.617000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6282 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 19:17:16.623521 kernel: kauditd_printk_skb: 272 callbacks suppressed Feb 9 19:17:16.623645 kernel: audit: type=1400 audit(1707506236.617:983): avc: denied { watch } for pid=1974 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6282 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 19:17:16.685616 kernel: audit: type=1300 audit(1707506236.617:983): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010d1a40 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:17:16.617000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010d1a40 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:17:16.685965 kubelet[2103]: I0209 19:17:16.658060 2103 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:17:16.685965 kubelet[2103]: I0209 19:17:16.658212 2103 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:17:16.685965 kubelet[2103]: I0209 19:17:16.658252 2103 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:17:16.685965 kubelet[2103]: I0209 19:17:16.683133 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0c9e25a1e01135844ad6ab8fb3395a78-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"0c9e25a1e01135844ad6ab8fb3395a78\") " pod="kube-system/kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:16.685965 kubelet[2103]: I0209 19:17:16.683206 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d43acd53fe4700344bdbdc19001ed64b-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"d43acd53fe4700344bdbdc19001ed64b\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:16.685965 kubelet[2103]: I0209 19:17:16.683260 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d43acd53fe4700344bdbdc19001ed64b-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"d43acd53fe4700344bdbdc19001ed64b\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:16.686361 kubelet[2103]: I0209 19:17:16.683298 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/23a85b84dc7d0bd6d38314fd36bdbc89-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"23a85b84dc7d0bd6d38314fd36bdbc89\") " pod="kube-system/kube-scheduler-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:16.686361 kubelet[2103]: I0209 19:17:16.683348 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0c9e25a1e01135844ad6ab8fb3395a78-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"0c9e25a1e01135844ad6ab8fb3395a78\") " pod="kube-system/kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:16.686361 kubelet[2103]: I0209 19:17:16.683395 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0c9e25a1e01135844ad6ab8fb3395a78-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"0c9e25a1e01135844ad6ab8fb3395a78\") " pod="kube-system/kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:16.686361 kubelet[2103]: I0209 19:17:16.683451 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d43acd53fe4700344bdbdc19001ed64b-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"d43acd53fe4700344bdbdc19001ed64b\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:16.686584 kubelet[2103]: I0209 19:17:16.683504 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d43acd53fe4700344bdbdc19001ed64b-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"d43acd53fe4700344bdbdc19001ed64b\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:16.686584 kubelet[2103]: I0209 19:17:16.683547 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d43acd53fe4700344bdbdc19001ed64b-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" (UID: \"d43acd53fe4700344bdbdc19001ed64b\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:16.617000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:16.717774 kernel: audit: type=1327 audit(1707506236.617:983): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:16.726815 kubelet[2103]: W0209 19:17:16.726779 2103 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Feb 9 19:17:16.726991 kubelet[2103]: E0209 19:17:16.726903 2103 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:16.727279 kubelet[2103]: W0209 19:17:16.727254 2103 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Feb 9 19:17:16.728127 kubelet[2103]: W0209 19:17:16.728101 2103 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Feb 9 19:17:16.728253 kubelet[2103]: E0209 19:17:16.728193 2103 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:17:17.227104 kubelet[2103]: I0209 19:17:17.227015 2103 apiserver.go:52] "Watching apiserver" Feb 9 19:17:17.279084 kubelet[2103]: I0209 19:17:17.279037 2103 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 19:17:17.286604 kubelet[2103]: I0209 19:17:17.286562 2103 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:17:17.490062 kubelet[2103]: I0209 19:17:17.489907 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" podStartSLOduration=1.489799711 podCreationTimestamp="2024-02-09 19:17:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:17:17.487424719 +0000 UTC m=+1.394402557" watchObservedRunningTime="2024-02-09 19:17:17.489799711 +0000 UTC m=+1.396777550" Feb 9 19:17:20.983522 sudo[1370]: pam_unix(sudo:session): session closed for user root Feb 9 19:17:20.982000 audit[1370]: USER_END pid=1370 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:17:20.982000 audit[1370]: CRED_DISP pid=1370 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:17:21.032270 kernel: audit: type=1106 audit(1707506240.982:984): pid=1370 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:17:21.032453 kernel: audit: type=1104 audit(1707506240.982:985): pid=1370 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:17:21.033611 sshd[1367]: pam_unix(sshd:session): session closed for user core Feb 9 19:17:21.035000 audit[1367]: USER_END pid=1367 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:21.039042 systemd[1]: sshd@8-10.128.0.97:22-147.75.109.163:60326.service: Deactivated successfully. Feb 9 19:17:21.040168 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 19:17:21.040384 systemd[1]: session-9.scope: Consumed 6.375s CPU time. Feb 9 19:17:21.047372 systemd-logind[1136]: Session 9 logged out. Waiting for processes to exit. Feb 9 19:17:21.049505 systemd-logind[1136]: Removed session 9. Feb 9 19:17:21.035000 audit[1367]: CRED_DISP pid=1367 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:21.093314 kernel: audit: type=1106 audit(1707506241.035:986): pid=1367 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:21.093488 kernel: audit: type=1104 audit(1707506241.035:987): pid=1367 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:21.093538 kernel: audit: type=1131 audit(1707506241.035:988): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.97:22-147.75.109.163:60326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:21.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.97:22-147.75.109.163:60326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:26.908000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:26.912000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:26.960193 kernel: audit: type=1400 audit(1707506246.908:989): avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:26.960367 kernel: audit: type=1400 audit(1707506246.912:990): avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:26.912000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d87b40 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:17:26.995970 kernel: audit: type=1300 audit(1707506246.912:990): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d87b40 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:17:26.912000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:26.913000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:27.052217 kernel: audit: type=1327 audit(1707506246.912:990): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:27.052391 kernel: audit: type=1400 audit(1707506246.913:991): avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:27.052440 kernel: audit: type=1300 audit(1707506246.913:991): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d87c80 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:17:26.913000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d87c80 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:17:26.913000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:27.115459 kernel: audit: type=1327 audit(1707506246.913:991): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:27.115640 kernel: audit: type=1400 audit(1707506246.917:992): avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:26.917000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:26.917000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f1e380 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:17:27.175355 kernel: audit: type=1300 audit(1707506246.917:992): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f1e380 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:17:27.175536 kernel: audit: type=1327 audit(1707506246.917:992): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:26.917000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:26.908000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d87b00 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:17:26.908000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:29.543985 kubelet[2103]: I0209 19:17:29.543949 2103 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 19:17:29.545203 env[1156]: time="2024-02-09T19:17:29.545149826Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:17:29.546116 kubelet[2103]: I0209 19:17:29.546092 2103 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 19:17:30.278587 kubelet[2103]: I0209 19:17:30.278537 2103 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:17:30.286452 systemd[1]: Created slice kubepods-besteffort-pod519cc9b1_2b0a_4bec_841c_719fb1f346f6.slice. Feb 9 19:17:30.307298 kubelet[2103]: I0209 19:17:30.307259 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/519cc9b1-2b0a-4bec-841c-719fb1f346f6-xtables-lock\") pod \"kube-proxy-7p6cn\" (UID: \"519cc9b1-2b0a-4bec-841c-719fb1f346f6\") " pod="kube-system/kube-proxy-7p6cn" Feb 9 19:17:30.307484 kubelet[2103]: I0209 19:17:30.307322 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/519cc9b1-2b0a-4bec-841c-719fb1f346f6-kube-proxy\") pod \"kube-proxy-7p6cn\" (UID: \"519cc9b1-2b0a-4bec-841c-719fb1f346f6\") " pod="kube-system/kube-proxy-7p6cn" Feb 9 19:17:30.307484 kubelet[2103]: I0209 19:17:30.307355 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/519cc9b1-2b0a-4bec-841c-719fb1f346f6-lib-modules\") pod \"kube-proxy-7p6cn\" (UID: \"519cc9b1-2b0a-4bec-841c-719fb1f346f6\") " pod="kube-system/kube-proxy-7p6cn" Feb 9 19:17:30.307484 kubelet[2103]: I0209 19:17:30.307386 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7hktj\" (UniqueName: \"kubernetes.io/projected/519cc9b1-2b0a-4bec-841c-719fb1f346f6-kube-api-access-7hktj\") pod \"kube-proxy-7p6cn\" (UID: \"519cc9b1-2b0a-4bec-841c-719fb1f346f6\") " pod="kube-system/kube-proxy-7p6cn" Feb 9 19:17:30.539783 kubelet[2103]: I0209 19:17:30.539650 2103 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:17:30.549550 systemd[1]: Created slice kubepods-besteffort-podf6317140_dd25_4501_b16b_fc720ddcd4e4.slice. Feb 9 19:17:30.603719 env[1156]: time="2024-02-09T19:17:30.603088283Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7p6cn,Uid:519cc9b1-2b0a-4bec-841c-719fb1f346f6,Namespace:kube-system,Attempt:0,}" Feb 9 19:17:30.610095 kubelet[2103]: I0209 19:17:30.610060 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f6317140-dd25-4501-b16b-fc720ddcd4e4-var-lib-calico\") pod \"tigera-operator-7ff8dc855-fnt58\" (UID: \"f6317140-dd25-4501-b16b-fc720ddcd4e4\") " pod="tigera-operator/tigera-operator-7ff8dc855-fnt58" Feb 9 19:17:30.610910 kubelet[2103]: I0209 19:17:30.610887 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zsqw4\" (UniqueName: \"kubernetes.io/projected/f6317140-dd25-4501-b16b-fc720ddcd4e4-kube-api-access-zsqw4\") pod \"tigera-operator-7ff8dc855-fnt58\" (UID: \"f6317140-dd25-4501-b16b-fc720ddcd4e4\") " pod="tigera-operator/tigera-operator-7ff8dc855-fnt58" Feb 9 19:17:30.633412 env[1156]: time="2024-02-09T19:17:30.633266058Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:17:30.633586 env[1156]: time="2024-02-09T19:17:30.633433344Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:17:30.633586 env[1156]: time="2024-02-09T19:17:30.633505217Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:17:30.634131 env[1156]: time="2024-02-09T19:17:30.634063470Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c074b3ec1c5cda2cab63e0dc348756d7afca37a00944ccb21bf49484a66ff130 pid=2186 runtime=io.containerd.runc.v2 Feb 9 19:17:30.666121 systemd[1]: Started cri-containerd-c074b3ec1c5cda2cab63e0dc348756d7afca37a00944ccb21bf49484a66ff130.scope. Feb 9 19:17:30.669810 systemd[1]: run-containerd-runc-k8s.io-c074b3ec1c5cda2cab63e0dc348756d7afca37a00944ccb21bf49484a66ff130-runc.TuMEla.mount: Deactivated successfully. Feb 9 19:17:30.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.689000 audit: BPF prog-id=115 op=LOAD Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2186 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330373462336563316335636461326361623633653064633334383735 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2186 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330373462336563316335636461326361623633653064633334383735 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit: BPF prog-id=116 op=LOAD Feb 9 19:17:30.690000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000300350 items=0 ppid=2186 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330373462336563316335636461326361623633653064633334383735 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.690000 audit: BPF prog-id=117 op=LOAD Feb 9 19:17:30.690000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000300398 items=0 ppid=2186 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330373462336563316335636461326361623633653064633334383735 Feb 9 19:17:30.690000 audit: BPF prog-id=117 op=UNLOAD Feb 9 19:17:30.690000 audit: BPF prog-id=116 op=UNLOAD Feb 9 19:17:30.691000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.691000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.691000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.691000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.691000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.691000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.691000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.691000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.691000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.691000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.691000 audit: BPF prog-id=118 op=LOAD Feb 9 19:17:30.691000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003007a8 items=0 ppid=2186 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330373462336563316335636461326361623633653064633334383735 Feb 9 19:17:30.715800 env[1156]: time="2024-02-09T19:17:30.715743725Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7p6cn,Uid:519cc9b1-2b0a-4bec-841c-719fb1f346f6,Namespace:kube-system,Attempt:0,} returns sandbox id \"c074b3ec1c5cda2cab63e0dc348756d7afca37a00944ccb21bf49484a66ff130\"" Feb 9 19:17:30.719622 env[1156]: time="2024-02-09T19:17:30.719572444Z" level=info msg="CreateContainer within sandbox \"c074b3ec1c5cda2cab63e0dc348756d7afca37a00944ccb21bf49484a66ff130\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:17:30.756970 env[1156]: time="2024-02-09T19:17:30.756886928Z" level=info msg="CreateContainer within sandbox \"c074b3ec1c5cda2cab63e0dc348756d7afca37a00944ccb21bf49484a66ff130\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"1d5cc3238cd7885234feee5dc3c655e45a97d894e36770d39893a7ab0f9fca0e\"" Feb 9 19:17:30.758008 env[1156]: time="2024-02-09T19:17:30.757963311Z" level=info msg="StartContainer for \"1d5cc3238cd7885234feee5dc3c655e45a97d894e36770d39893a7ab0f9fca0e\"" Feb 9 19:17:30.781777 systemd[1]: Started cri-containerd-1d5cc3238cd7885234feee5dc3c655e45a97d894e36770d39893a7ab0f9fca0e.scope. Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2186 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164356363333233386364373838353233346665656535646333633635 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit: BPF prog-id=119 op=LOAD Feb 9 19:17:30.808000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002949d0 items=0 ppid=2186 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164356363333233386364373838353233346665656535646333633635 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.808000 audit: BPF prog-id=120 op=LOAD Feb 9 19:17:30.808000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000294a18 items=0 ppid=2186 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164356363333233386364373838353233346665656535646333633635 Feb 9 19:17:30.808000 audit: BPF prog-id=120 op=UNLOAD Feb 9 19:17:30.809000 audit: BPF prog-id=119 op=UNLOAD Feb 9 19:17:30.809000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.809000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.809000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.809000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.809000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.809000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.809000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.809000 audit[2232]: AVC avc: denied { perfmon } for pid=2232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.809000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.809000 audit[2232]: AVC avc: denied { bpf } for pid=2232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.809000 audit: BPF prog-id=121 op=LOAD Feb 9 19:17:30.809000 audit[2232]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000294aa8 items=0 ppid=2186 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164356363333233386364373838353233346665656535646333633635 Feb 9 19:17:30.838365 env[1156]: time="2024-02-09T19:17:30.838297719Z" level=info msg="StartContainer for \"1d5cc3238cd7885234feee5dc3c655e45a97d894e36770d39893a7ab0f9fca0e\" returns successfully" Feb 9 19:17:30.854318 env[1156]: time="2024-02-09T19:17:30.854193689Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-fnt58,Uid:f6317140-dd25-4501-b16b-fc720ddcd4e4,Namespace:tigera-operator,Attempt:0,}" Feb 9 19:17:30.878567 env[1156]: time="2024-02-09T19:17:30.878465284Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:17:30.878781 env[1156]: time="2024-02-09T19:17:30.878592932Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:17:30.878781 env[1156]: time="2024-02-09T19:17:30.878633962Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:17:30.879309 env[1156]: time="2024-02-09T19:17:30.878940269Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6295fb90ed70b76491be0d5b95736b1fc9f47766024639488294391e21f3fd73 pid=2263 runtime=io.containerd.runc.v2 Feb 9 19:17:30.897639 systemd[1]: Started cri-containerd-6295fb90ed70b76491be0d5b95736b1fc9f47766024639488294391e21f3fd73.scope. Feb 9 19:17:30.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.931000 audit: BPF prog-id=122 op=LOAD Feb 9 19:17:30.932000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.932000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2263 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632393566623930656437306237363439316265306435623935373336 Feb 9 19:17:30.932000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.932000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2263 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632393566623930656437306237363439316265306435623935373336 Feb 9 19:17:30.933000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.933000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.933000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.933000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.933000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.933000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.933000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.933000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.933000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.933000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.933000 audit: BPF prog-id=123 op=LOAD Feb 9 19:17:30.933000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000aa340 items=0 ppid=2263 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632393566623930656437306237363439316265306435623935373336 Feb 9 19:17:30.936000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.936000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.936000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.936000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.936000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.936000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.936000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.936000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.936000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.936000 audit: BPF prog-id=124 op=LOAD Feb 9 19:17:30.936000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000aa388 items=0 ppid=2263 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632393566623930656437306237363439316265306435623935373336 Feb 9 19:17:30.937000 audit: BPF prog-id=124 op=UNLOAD Feb 9 19:17:30.937000 audit: BPF prog-id=123 op=UNLOAD Feb 9 19:17:30.939000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.939000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.939000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.939000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.939000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.939000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.939000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.939000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.939000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.939000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.939000 audit: BPF prog-id=125 op=LOAD Feb 9 19:17:30.939000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000aa798 items=0 ppid=2263 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632393566623930656437306237363439316265306435623935373336 Feb 9 19:17:30.971000 audit[2313]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:30.971000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeea572070 a2=0 a3=7ffeea57205c items=0 ppid=2242 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.971000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:17:30.975000 audit[2314]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:30.975000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5549eb60 a2=0 a3=7ffd5549eb4c items=0 ppid=2242 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.975000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:17:30.985000 audit[2321]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:30.985000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda99a6500 a2=0 a3=7ffda99a64ec items=0 ppid=2242 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.985000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:17:30.992000 audit[2322]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:30.992000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc2ef6dc0 a2=0 a3=7fffc2ef6dac items=0 ppid=2242 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.992000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:17:30.994324 env[1156]: time="2024-02-09T19:17:30.994247208Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-fnt58,Uid:f6317140-dd25-4501-b16b-fc720ddcd4e4,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"6295fb90ed70b76491be0d5b95736b1fc9f47766024639488294391e21f3fd73\"" Feb 9 19:17:30.995000 audit[2324]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:30.995000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc40869470 a2=0 a3=7ffc4086945c items=0 ppid=2242 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.995000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:17:31.000185 kubelet[2103]: E0209 19:17:31.000100 2103 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Feb 9 19:17:31.000747 env[1156]: time="2024-02-09T19:17:31.000702291Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 19:17:31.001000 audit[2325]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.001000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff568655f0 a2=0 a3=7fff568655dc items=0 ppid=2242 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.001000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:17:31.075000 audit[2326]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.075000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe82c9f130 a2=0 a3=7ffe82c9f11c items=0 ppid=2242 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.075000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:17:31.081000 audit[2328]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.081000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc54958e50 a2=0 a3=7ffc54958e3c items=0 ppid=2242 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:17:31.087000 audit[2331]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.087000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdef095430 a2=0 a3=7ffdef09541c items=0 ppid=2242 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:17:31.089000 audit[2332]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.089000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed84616a0 a2=0 a3=7ffed846168c items=0 ppid=2242 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:17:31.093000 audit[2334]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.093000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd6e02640 a2=0 a3=7fffd6e0262c items=0 ppid=2242 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:17:31.094000 audit[2335]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.094000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff61f58a10 a2=0 a3=7fff61f589fc items=0 ppid=2242 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:17:31.099000 audit[2337]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.099000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffda213ba90 a2=0 a3=7ffda213ba7c items=0 ppid=2242 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.099000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:17:31.104000 audit[2340]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.104000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcfdcb94e0 a2=0 a3=7ffcfdcb94cc items=0 ppid=2242 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.104000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:17:31.106000 audit[2341]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.106000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0eb0e0e0 a2=0 a3=7ffe0eb0e0cc items=0 ppid=2242 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:17:31.110000 audit[2343]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.110000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc307adbd0 a2=0 a3=7ffc307adbbc items=0 ppid=2242 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.110000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:17:31.112000 audit[2344]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.112000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff105a0a70 a2=0 a3=7fff105a0a5c items=0 ppid=2242 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:17:31.115000 audit[2346]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.115000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb6c1c000 a2=0 a3=7ffeb6c1bfec items=0 ppid=2242 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.115000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:17:31.121000 audit[2349]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.121000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc31d68170 a2=0 a3=7ffc31d6815c items=0 ppid=2242 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:17:31.126000 audit[2352]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.126000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe34892b30 a2=0 a3=7ffe34892b1c items=0 ppid=2242 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.126000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:17:31.128000 audit[2353]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.128000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd8b886b50 a2=0 a3=7ffd8b886b3c items=0 ppid=2242 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:17:31.132000 audit[2355]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.132000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffddc9cd880 a2=0 a3=7ffddc9cd86c items=0 ppid=2242 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.132000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:17:31.137000 audit[2358]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.137000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff9cc788d0 a2=0 a3=7fff9cc788bc items=0 ppid=2242 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.137000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:17:31.145000 audit[2363]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.145000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1b423a00 a2=0 a3=7ffe1b4239ec items=0 ppid=2242 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:17:31.149000 audit[2365]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:31.149000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fffed7856e0 a2=0 a3=7fffed7856cc items=0 ppid=2242 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.149000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:17:31.167000 audit[2367]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:31.167000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffe4a349cd0 a2=0 a3=7ffe4a349cbc items=0 ppid=2242 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.167000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:31.177000 audit[2367]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:31.177000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe4a349cd0 a2=0 a3=7ffe4a349cbc items=0 ppid=2242 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.177000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:31.180000 audit[2373]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.180000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc6c986720 a2=0 a3=7ffc6c98670c items=0 ppid=2242 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.180000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:17:31.184000 audit[2375]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.184000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc4a5c0690 a2=0 a3=7ffc4a5c067c items=0 ppid=2242 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.184000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:17:31.189000 audit[2378]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.189000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd987a0ff0 a2=0 a3=7ffd987a0fdc items=0 ppid=2242 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:17:31.191000 audit[2379]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.191000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5d1a1330 a2=0 a3=7fff5d1a131c items=0 ppid=2242 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.191000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:17:31.194000 audit[2381]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.194000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffed8dca6d0 a2=0 a3=7ffed8dca6bc items=0 ppid=2242 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:17:31.196000 audit[2382]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.196000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6b7a8630 a2=0 a3=7ffc6b7a861c items=0 ppid=2242 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.196000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:17:31.199000 audit[2384]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.199000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffec852de30 a2=0 a3=7ffec852de1c items=0 ppid=2242 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.199000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:17:31.204000 audit[2387]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.204000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd98459700 a2=0 a3=7ffd984596ec items=0 ppid=2242 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:17:31.206000 audit[2388]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.206000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7a93f370 a2=0 a3=7ffd7a93f35c items=0 ppid=2242 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.206000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:17:31.210000 audit[2390]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.210000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd214f93a0 a2=0 a3=7ffd214f938c items=0 ppid=2242 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.210000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:17:31.212000 audit[2391]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.212000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe959285c0 a2=0 a3=7ffe959285ac items=0 ppid=2242 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.212000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:17:31.217000 audit[2393]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.217000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff69a5b9f0 a2=0 a3=7fff69a5b9dc items=0 ppid=2242 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:17:31.222000 audit[2396]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.222000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc29b20440 a2=0 a3=7ffc29b2042c items=0 ppid=2242 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:17:31.227000 audit[2399]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.227000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe60cd0690 a2=0 a3=7ffe60cd067c items=0 ppid=2242 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.227000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:17:31.229000 audit[2400]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.229000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe93f60cc0 a2=0 a3=7ffe93f60cac items=0 ppid=2242 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.229000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:17:31.232000 audit[2402]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.232000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc3e259160 a2=0 a3=7ffc3e25914c items=0 ppid=2242 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:17:31.236000 audit[2405]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.236000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcd8577280 a2=0 a3=7ffcd857726c items=0 ppid=2242 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:17:31.238000 audit[2406]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.238000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed32aa420 a2=0 a3=7ffed32aa40c items=0 ppid=2242 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:17:31.241000 audit[2408]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.241000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd53d61770 a2=0 a3=7ffd53d6175c items=0 ppid=2242 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:17:31.247000 audit[2411]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.247000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffe0e5fa10 a2=0 a3=7fffe0e5f9fc items=0 ppid=2242 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:17:31.249000 audit[2412]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.249000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeba7dbdb0 a2=0 a3=7ffeba7dbd9c items=0 ppid=2242 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:17:31.252000 audit[2414]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:31.252000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffda3f84df0 a2=0 a3=7ffda3f84ddc items=0 ppid=2242 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:17:31.262000 audit[2416]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2416 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:17:31.262000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdf9d9f800 a2=0 a3=7ffdf9d9f7ec items=0 ppid=2242 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.262000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:31.263000 audit[2416]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:17:31.263000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffdf9d9f800 a2=0 a3=7ffdf9d9f7ec items=0 ppid=2242 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:31.263000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:31.464610 kubelet[2103]: I0209 19:17:31.464561 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-7p6cn" podStartSLOduration=1.464515027 podCreationTimestamp="2024-02-09 19:17:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:17:31.46421433 +0000 UTC m=+15.371192171" watchObservedRunningTime="2024-02-09 19:17:31.464515027 +0000 UTC m=+15.371492866" Feb 9 19:17:32.127742 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2781144733.mount: Deactivated successfully. Feb 9 19:17:33.141533 env[1156]: time="2024-02-09T19:17:33.141458646Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:33.145027 env[1156]: time="2024-02-09T19:17:33.144977150Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:33.147598 env[1156]: time="2024-02-09T19:17:33.147557740Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:33.149887 env[1156]: time="2024-02-09T19:17:33.149846923Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:33.150889 env[1156]: time="2024-02-09T19:17:33.150829958Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 9 19:17:33.153688 env[1156]: time="2024-02-09T19:17:33.153648203Z" level=info msg="CreateContainer within sandbox \"6295fb90ed70b76491be0d5b95736b1fc9f47766024639488294391e21f3fd73\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 19:17:33.173054 env[1156]: time="2024-02-09T19:17:33.172992500Z" level=info msg="CreateContainer within sandbox \"6295fb90ed70b76491be0d5b95736b1fc9f47766024639488294391e21f3fd73\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"7da251e3bf6a8815e107be7cb529641c1ad238809355927c3d1b96d70898a8c1\"" Feb 9 19:17:33.175764 env[1156]: time="2024-02-09T19:17:33.175650072Z" level=info msg="StartContainer for \"7da251e3bf6a8815e107be7cb529641c1ad238809355927c3d1b96d70898a8c1\"" Feb 9 19:17:33.210574 systemd[1]: run-containerd-runc-k8s.io-7da251e3bf6a8815e107be7cb529641c1ad238809355927c3d1b96d70898a8c1-runc.gDxueB.mount: Deactivated successfully. Feb 9 19:17:33.218865 systemd[1]: Started cri-containerd-7da251e3bf6a8815e107be7cb529641c1ad238809355927c3d1b96d70898a8c1.scope. Feb 9 19:17:33.265724 kernel: kauditd_printk_skb: 312 callbacks suppressed Feb 9 19:17:33.265902 kernel: audit: type=1400 audit(1707506253.238:1086): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.288399 kernel: audit: type=1400 audit(1707506253.238:1087): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.330968 kernel: audit: type=1400 audit(1707506253.238:1088): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.331138 kernel: audit: type=1400 audit(1707506253.238:1089): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.352373 kernel: audit: type=1400 audit(1707506253.238:1090): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.352595 kernel: audit: type=1400 audit(1707506253.238:1091): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.396240 kernel: audit: type=1400 audit(1707506253.238:1092): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.396411 kernel: audit: type=1400 audit(1707506253.238:1093): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.459797 kernel: audit: type=1400 audit(1707506253.238:1094): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.460226 kernel: audit: type=1400 audit(1707506253.264:1095): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.264000 audit: BPF prog-id=126 op=LOAD Feb 9 19:17:33.265000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.265000 audit[2425]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2263 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:33.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764613235316533626636613838313565313037626537636235323936 Feb 9 19:17:33.265000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.265000 audit[2425]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2263 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:33.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764613235316533626636613838313565313037626537636235323936 Feb 9 19:17:33.265000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.265000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.265000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.265000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.265000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.265000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.461707 env[1156]: time="2024-02-09T19:17:33.461609751Z" level=info msg="StartContainer for \"7da251e3bf6a8815e107be7cb529641c1ad238809355927c3d1b96d70898a8c1\" returns successfully" Feb 9 19:17:33.265000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.265000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.265000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.265000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.265000 audit: BPF prog-id=127 op=LOAD Feb 9 19:17:33.265000 audit[2425]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000312de0 items=0 ppid=2263 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:33.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764613235316533626636613838313565313037626537636235323936 Feb 9 19:17:33.287000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.287000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.287000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.287000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.287000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.287000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.287000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.287000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.287000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.287000 audit: BPF prog-id=128 op=LOAD Feb 9 19:17:33.287000 audit[2425]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000187ed8 items=0 ppid=2263 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:33.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764613235316533626636613838313565313037626537636235323936 Feb 9 19:17:33.287000 audit: BPF prog-id=128 op=UNLOAD Feb 9 19:17:33.287000 audit: BPF prog-id=127 op=UNLOAD Feb 9 19:17:33.288000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.288000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.288000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.288000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.288000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.288000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.288000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.288000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.288000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.288000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:33.288000 audit: BPF prog-id=129 op=LOAD Feb 9 19:17:33.288000 audit[2425]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c62e8 items=0 ppid=2263 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:33.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764613235316533626636613838313565313037626537636235323936 Feb 9 19:17:34.475571 kubelet[2103]: I0209 19:17:34.475522 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-fnt58" podStartSLOduration=2.320517952 podCreationTimestamp="2024-02-09 19:17:30 +0000 UTC" firstStartedPulling="2024-02-09 19:17:30.996442915 +0000 UTC m=+14.903420743" lastFinishedPulling="2024-02-09 19:17:33.151375226 +0000 UTC m=+17.058369346" observedRunningTime="2024-02-09 19:17:34.475239428 +0000 UTC m=+18.382217267" watchObservedRunningTime="2024-02-09 19:17:34.475466555 +0000 UTC m=+18.382444390" Feb 9 19:17:35.496000 audit[2457]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2457 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:35.496000 audit[2457]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd8f9ff250 a2=0 a3=7ffd8f9ff23c items=0 ppid=2242 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:35.496000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:35.497000 audit[2457]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2457 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:35.497000 audit[2457]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd8f9ff250 a2=0 a3=31030 items=0 ppid=2242 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:35.497000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:35.511000 audit[2459]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:35.511000 audit[2459]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd78e63670 a2=0 a3=7ffd78e6365c items=0 ppid=2242 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:35.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:35.512000 audit[2459]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:35.512000 audit[2459]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd78e63670 a2=0 a3=31030 items=0 ppid=2242 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:35.512000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:35.651844 kubelet[2103]: I0209 19:17:35.651804 2103 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:17:35.660454 systemd[1]: Created slice kubepods-besteffort-pod8717aeec_5fb3_4fd3_bb70_f534d87be5a3.slice. Feb 9 19:17:35.746107 kubelet[2103]: I0209 19:17:35.746020 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8717aeec-5fb3-4fd3-bb70-f534d87be5a3-tigera-ca-bundle\") pod \"calico-typha-754d779bf-msj57\" (UID: \"8717aeec-5fb3-4fd3-bb70-f534d87be5a3\") " pod="calico-system/calico-typha-754d779bf-msj57" Feb 9 19:17:35.746339 kubelet[2103]: I0209 19:17:35.746159 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/8717aeec-5fb3-4fd3-bb70-f534d87be5a3-typha-certs\") pod \"calico-typha-754d779bf-msj57\" (UID: \"8717aeec-5fb3-4fd3-bb70-f534d87be5a3\") " pod="calico-system/calico-typha-754d779bf-msj57" Feb 9 19:17:35.746339 kubelet[2103]: I0209 19:17:35.746237 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rp2gt\" (UniqueName: \"kubernetes.io/projected/8717aeec-5fb3-4fd3-bb70-f534d87be5a3-kube-api-access-rp2gt\") pod \"calico-typha-754d779bf-msj57\" (UID: \"8717aeec-5fb3-4fd3-bb70-f534d87be5a3\") " pod="calico-system/calico-typha-754d779bf-msj57" Feb 9 19:17:35.759525 kubelet[2103]: I0209 19:17:35.759402 2103 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:17:35.769066 systemd[1]: Created slice kubepods-besteffort-pod2b6ab274_40e5_4e36_be8e_140ba3653eea.slice. Feb 9 19:17:35.847436 kubelet[2103]: I0209 19:17:35.847383 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/2b6ab274-40e5-4e36-be8e-140ba3653eea-policysync\") pod \"calico-node-f5ppk\" (UID: \"2b6ab274-40e5-4e36-be8e-140ba3653eea\") " pod="calico-system/calico-node-f5ppk" Feb 9 19:17:35.847647 kubelet[2103]: I0209 19:17:35.847452 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/2b6ab274-40e5-4e36-be8e-140ba3653eea-cni-net-dir\") pod \"calico-node-f5ppk\" (UID: \"2b6ab274-40e5-4e36-be8e-140ba3653eea\") " pod="calico-system/calico-node-f5ppk" Feb 9 19:17:35.847647 kubelet[2103]: I0209 19:17:35.847526 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2b6ab274-40e5-4e36-be8e-140ba3653eea-lib-modules\") pod \"calico-node-f5ppk\" (UID: \"2b6ab274-40e5-4e36-be8e-140ba3653eea\") " pod="calico-system/calico-node-f5ppk" Feb 9 19:17:35.847647 kubelet[2103]: I0209 19:17:35.847557 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2b6ab274-40e5-4e36-be8e-140ba3653eea-xtables-lock\") pod \"calico-node-f5ppk\" (UID: \"2b6ab274-40e5-4e36-be8e-140ba3653eea\") " pod="calico-system/calico-node-f5ppk" Feb 9 19:17:35.847647 kubelet[2103]: I0209 19:17:35.847588 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2b6ab274-40e5-4e36-be8e-140ba3653eea-var-lib-calico\") pod \"calico-node-f5ppk\" (UID: \"2b6ab274-40e5-4e36-be8e-140ba3653eea\") " pod="calico-system/calico-node-f5ppk" Feb 9 19:17:35.847647 kubelet[2103]: I0209 19:17:35.847619 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-244g6\" (UniqueName: \"kubernetes.io/projected/2b6ab274-40e5-4e36-be8e-140ba3653eea-kube-api-access-244g6\") pod \"calico-node-f5ppk\" (UID: \"2b6ab274-40e5-4e36-be8e-140ba3653eea\") " pod="calico-system/calico-node-f5ppk" Feb 9 19:17:35.847975 kubelet[2103]: I0209 19:17:35.847652 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/2b6ab274-40e5-4e36-be8e-140ba3653eea-node-certs\") pod \"calico-node-f5ppk\" (UID: \"2b6ab274-40e5-4e36-be8e-140ba3653eea\") " pod="calico-system/calico-node-f5ppk" Feb 9 19:17:35.847975 kubelet[2103]: I0209 19:17:35.847705 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/2b6ab274-40e5-4e36-be8e-140ba3653eea-cni-log-dir\") pod \"calico-node-f5ppk\" (UID: \"2b6ab274-40e5-4e36-be8e-140ba3653eea\") " pod="calico-system/calico-node-f5ppk" Feb 9 19:17:35.847975 kubelet[2103]: I0209 19:17:35.847741 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/2b6ab274-40e5-4e36-be8e-140ba3653eea-cni-bin-dir\") pod \"calico-node-f5ppk\" (UID: \"2b6ab274-40e5-4e36-be8e-140ba3653eea\") " pod="calico-system/calico-node-f5ppk" Feb 9 19:17:35.847975 kubelet[2103]: I0209 19:17:35.847778 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/2b6ab274-40e5-4e36-be8e-140ba3653eea-var-run-calico\") pod \"calico-node-f5ppk\" (UID: \"2b6ab274-40e5-4e36-be8e-140ba3653eea\") " pod="calico-system/calico-node-f5ppk" Feb 9 19:17:35.847975 kubelet[2103]: I0209 19:17:35.847813 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2b6ab274-40e5-4e36-be8e-140ba3653eea-tigera-ca-bundle\") pod \"calico-node-f5ppk\" (UID: \"2b6ab274-40e5-4e36-be8e-140ba3653eea\") " pod="calico-system/calico-node-f5ppk" Feb 9 19:17:35.848237 kubelet[2103]: I0209 19:17:35.847853 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/2b6ab274-40e5-4e36-be8e-140ba3653eea-flexvol-driver-host\") pod \"calico-node-f5ppk\" (UID: \"2b6ab274-40e5-4e36-be8e-140ba3653eea\") " pod="calico-system/calico-node-f5ppk" Feb 9 19:17:35.898635 kubelet[2103]: I0209 19:17:35.898575 2103 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:17:35.899024 kubelet[2103]: E0209 19:17:35.898992 2103 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-257w5" podUID=77063012-a45d-44ad-b8fb-c0d671aa8bc5 Feb 9 19:17:35.948356 kubelet[2103]: I0209 19:17:35.948307 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/77063012-a45d-44ad-b8fb-c0d671aa8bc5-socket-dir\") pod \"csi-node-driver-257w5\" (UID: \"77063012-a45d-44ad-b8fb-c0d671aa8bc5\") " pod="calico-system/csi-node-driver-257w5" Feb 9 19:17:35.948576 kubelet[2103]: I0209 19:17:35.948442 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/77063012-a45d-44ad-b8fb-c0d671aa8bc5-registration-dir\") pod \"csi-node-driver-257w5\" (UID: \"77063012-a45d-44ad-b8fb-c0d671aa8bc5\") " pod="calico-system/csi-node-driver-257w5" Feb 9 19:17:35.948576 kubelet[2103]: I0209 19:17:35.948511 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tzkh9\" (UniqueName: \"kubernetes.io/projected/77063012-a45d-44ad-b8fb-c0d671aa8bc5-kube-api-access-tzkh9\") pod \"csi-node-driver-257w5\" (UID: \"77063012-a45d-44ad-b8fb-c0d671aa8bc5\") " pod="calico-system/csi-node-driver-257w5" Feb 9 19:17:35.948576 kubelet[2103]: I0209 19:17:35.948563 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/77063012-a45d-44ad-b8fb-c0d671aa8bc5-varrun\") pod \"csi-node-driver-257w5\" (UID: \"77063012-a45d-44ad-b8fb-c0d671aa8bc5\") " pod="calico-system/csi-node-driver-257w5" Feb 9 19:17:35.948758 kubelet[2103]: I0209 19:17:35.948631 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/77063012-a45d-44ad-b8fb-c0d671aa8bc5-kubelet-dir\") pod \"csi-node-driver-257w5\" (UID: \"77063012-a45d-44ad-b8fb-c0d671aa8bc5\") " pod="calico-system/csi-node-driver-257w5" Feb 9 19:17:35.950539 kubelet[2103]: E0209 19:17:35.950504 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.950539 kubelet[2103]: W0209 19:17:35.950532 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.950767 kubelet[2103]: E0209 19:17:35.950569 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.950946 kubelet[2103]: E0209 19:17:35.950915 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.951047 kubelet[2103]: W0209 19:17:35.950967 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.951047 kubelet[2103]: E0209 19:17:35.950998 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.951391 kubelet[2103]: E0209 19:17:35.951369 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.951482 kubelet[2103]: W0209 19:17:35.951390 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.951482 kubelet[2103]: E0209 19:17:35.951424 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.951764 kubelet[2103]: E0209 19:17:35.951743 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.951853 kubelet[2103]: W0209 19:17:35.951764 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.951853 kubelet[2103]: E0209 19:17:35.951799 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.952148 kubelet[2103]: E0209 19:17:35.952126 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.952148 kubelet[2103]: W0209 19:17:35.952147 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.952299 kubelet[2103]: E0209 19:17:35.952186 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.952526 kubelet[2103]: E0209 19:17:35.952504 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.952526 kubelet[2103]: W0209 19:17:35.952525 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.952661 kubelet[2103]: E0209 19:17:35.952550 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.952878 kubelet[2103]: E0209 19:17:35.952857 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.952878 kubelet[2103]: W0209 19:17:35.952876 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.953074 kubelet[2103]: E0209 19:17:35.952907 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.953228 kubelet[2103]: E0209 19:17:35.953208 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.953228 kubelet[2103]: W0209 19:17:35.953228 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.953354 kubelet[2103]: E0209 19:17:35.953247 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.953650 kubelet[2103]: E0209 19:17:35.953628 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.953650 kubelet[2103]: W0209 19:17:35.953649 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.953792 kubelet[2103]: E0209 19:17:35.953676 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.954991 kubelet[2103]: E0209 19:17:35.954011 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.954991 kubelet[2103]: W0209 19:17:35.954035 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.954991 kubelet[2103]: E0209 19:17:35.954058 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.954991 kubelet[2103]: E0209 19:17:35.954410 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.954991 kubelet[2103]: W0209 19:17:35.954423 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.954991 kubelet[2103]: E0209 19:17:35.954456 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.954991 kubelet[2103]: E0209 19:17:35.954759 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.954991 kubelet[2103]: W0209 19:17:35.954772 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.954991 kubelet[2103]: E0209 19:17:35.954796 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.955524 kubelet[2103]: E0209 19:17:35.955424 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.955524 kubelet[2103]: W0209 19:17:35.955439 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.955641 kubelet[2103]: E0209 19:17:35.955569 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.955826 kubelet[2103]: E0209 19:17:35.955806 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.955826 kubelet[2103]: W0209 19:17:35.955825 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.956030 kubelet[2103]: E0209 19:17:35.955970 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.956221 kubelet[2103]: E0209 19:17:35.956198 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.956221 kubelet[2103]: W0209 19:17:35.956219 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.956362 kubelet[2103]: E0209 19:17:35.956352 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.956667 kubelet[2103]: E0209 19:17:35.956644 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.956667 kubelet[2103]: W0209 19:17:35.956665 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.956838 kubelet[2103]: E0209 19:17:35.956818 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.957089 kubelet[2103]: E0209 19:17:35.957070 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.957089 kubelet[2103]: W0209 19:17:35.957089 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.957247 kubelet[2103]: E0209 19:17:35.957210 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.957474 kubelet[2103]: E0209 19:17:35.957454 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.957474 kubelet[2103]: W0209 19:17:35.957472 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.957617 kubelet[2103]: E0209 19:17:35.957588 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.957859 kubelet[2103]: E0209 19:17:35.957838 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.957859 kubelet[2103]: W0209 19:17:35.957857 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.958030 kubelet[2103]: E0209 19:17:35.958021 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.958287 kubelet[2103]: E0209 19:17:35.958264 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.958378 kubelet[2103]: W0209 19:17:35.958291 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.958439 kubelet[2103]: E0209 19:17:35.958424 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.972002 kubelet[2103]: E0209 19:17:35.958619 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.972002 kubelet[2103]: W0209 19:17:35.958638 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.972002 kubelet[2103]: E0209 19:17:35.958662 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.972002 kubelet[2103]: E0209 19:17:35.960272 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.972002 kubelet[2103]: W0209 19:17:35.960286 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.972002 kubelet[2103]: E0209 19:17:35.960442 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.972002 kubelet[2103]: E0209 19:17:35.960628 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.972002 kubelet[2103]: W0209 19:17:35.960639 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.972002 kubelet[2103]: E0209 19:17:35.960657 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:35.972596 env[1156]: time="2024-02-09T19:17:35.970651965Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-754d779bf-msj57,Uid:8717aeec-5fb3-4fd3-bb70-f534d87be5a3,Namespace:calico-system,Attempt:0,}" Feb 9 19:17:35.976958 kubelet[2103]: E0209 19:17:35.975261 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:35.976958 kubelet[2103]: W0209 19:17:35.975281 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:35.976958 kubelet[2103]: E0209 19:17:35.975335 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.002242 env[1156]: time="2024-02-09T19:17:36.002155775Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:17:36.002435 env[1156]: time="2024-02-09T19:17:36.002272842Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:17:36.002435 env[1156]: time="2024-02-09T19:17:36.002318615Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:17:36.002577 env[1156]: time="2024-02-09T19:17:36.002506018Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dcfc1df829bd1bff85a152426d2a11f5491de985aeeb262faee487cf94f43848 pid=2493 runtime=io.containerd.runc.v2 Feb 9 19:17:36.029030 kubelet[2103]: E0209 19:17:36.028903 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.034963 kubelet[2103]: W0209 19:17:36.032007 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.034963 kubelet[2103]: E0209 19:17:36.032059 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.047613 systemd[1]: Started cri-containerd-dcfc1df829bd1bff85a152426d2a11f5491de985aeeb262faee487cf94f43848.scope. Feb 9 19:17:36.049736 kubelet[2103]: E0209 19:17:36.049694 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.049736 kubelet[2103]: W0209 19:17:36.049717 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.049996 kubelet[2103]: E0209 19:17:36.049747 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.050224 kubelet[2103]: E0209 19:17:36.050202 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.050224 kubelet[2103]: W0209 19:17:36.050223 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.050401 kubelet[2103]: E0209 19:17:36.050251 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.050883 kubelet[2103]: E0209 19:17:36.050831 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.050883 kubelet[2103]: W0209 19:17:36.050848 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.050883 kubelet[2103]: E0209 19:17:36.050870 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.051248 kubelet[2103]: E0209 19:17:36.051231 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.051248 kubelet[2103]: W0209 19:17:36.051247 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.051406 kubelet[2103]: E0209 19:17:36.051372 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.051675 kubelet[2103]: E0209 19:17:36.051652 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.051675 kubelet[2103]: W0209 19:17:36.051673 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.051821 kubelet[2103]: E0209 19:17:36.051811 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.052704 kubelet[2103]: E0209 19:17:36.052070 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.052704 kubelet[2103]: W0209 19:17:36.052097 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.052704 kubelet[2103]: E0209 19:17:36.052369 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.052704 kubelet[2103]: W0209 19:17:36.052381 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.052704 kubelet[2103]: E0209 19:17:36.052400 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.052704 kubelet[2103]: E0209 19:17:36.052665 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.052704 kubelet[2103]: E0209 19:17:36.052682 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.052704 kubelet[2103]: W0209 19:17:36.052692 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.052704 kubelet[2103]: E0209 19:17:36.052709 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.056983 kubelet[2103]: E0209 19:17:36.053002 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.056983 kubelet[2103]: W0209 19:17:36.053015 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.056983 kubelet[2103]: E0209 19:17:36.053044 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.056983 kubelet[2103]: E0209 19:17:36.053355 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.056983 kubelet[2103]: W0209 19:17:36.053367 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.056983 kubelet[2103]: E0209 19:17:36.053385 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.056983 kubelet[2103]: E0209 19:17:36.053981 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.056983 kubelet[2103]: W0209 19:17:36.053996 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.056983 kubelet[2103]: E0209 19:17:36.054018 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.056983 kubelet[2103]: E0209 19:17:36.054347 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.057490 kubelet[2103]: W0209 19:17:36.054359 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.057490 kubelet[2103]: E0209 19:17:36.054378 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.057490 kubelet[2103]: E0209 19:17:36.056023 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.057490 kubelet[2103]: W0209 19:17:36.056037 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.057490 kubelet[2103]: E0209 19:17:36.056057 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.057490 kubelet[2103]: E0209 19:17:36.056357 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.057490 kubelet[2103]: W0209 19:17:36.056370 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.057490 kubelet[2103]: E0209 19:17:36.056416 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.057490 kubelet[2103]: E0209 19:17:36.056808 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.057490 kubelet[2103]: W0209 19:17:36.056823 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.058026 kubelet[2103]: E0209 19:17:36.056855 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.064125 kubelet[2103]: E0209 19:17:36.064076 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.064125 kubelet[2103]: W0209 19:17:36.064099 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.064125 kubelet[2103]: E0209 19:17:36.064129 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.064576 kubelet[2103]: E0209 19:17:36.064534 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.064576 kubelet[2103]: W0209 19:17:36.064558 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.064738 kubelet[2103]: E0209 19:17:36.064696 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.065047 kubelet[2103]: E0209 19:17:36.065025 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.065047 kubelet[2103]: W0209 19:17:36.065046 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.065228 kubelet[2103]: E0209 19:17:36.065171 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.065394 kubelet[2103]: E0209 19:17:36.065366 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.065394 kubelet[2103]: W0209 19:17:36.065384 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.065545 kubelet[2103]: E0209 19:17:36.065536 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.065762 kubelet[2103]: E0209 19:17:36.065742 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.065762 kubelet[2103]: W0209 19:17:36.065761 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.065917 kubelet[2103]: E0209 19:17:36.065788 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.066178 kubelet[2103]: E0209 19:17:36.066150 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.066178 kubelet[2103]: W0209 19:17:36.066170 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.066318 kubelet[2103]: E0209 19:17:36.066196 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.066695 kubelet[2103]: E0209 19:17:36.066670 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.066695 kubelet[2103]: W0209 19:17:36.066692 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.066865 kubelet[2103]: E0209 19:17:36.066717 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.067051 kubelet[2103]: E0209 19:17:36.067028 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.067051 kubelet[2103]: W0209 19:17:36.067050 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.067205 kubelet[2103]: E0209 19:17:36.067069 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.067383 kubelet[2103]: E0209 19:17:36.067360 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.067383 kubelet[2103]: W0209 19:17:36.067382 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.067540 kubelet[2103]: E0209 19:17:36.067402 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.067718 kubelet[2103]: E0209 19:17:36.067696 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.067718 kubelet[2103]: W0209 19:17:36.067717 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.067854 kubelet[2103]: E0209 19:17:36.067736 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.074579 env[1156]: time="2024-02-09T19:17:36.074081841Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-f5ppk,Uid:2b6ab274-40e5-4e36-be8e-140ba3653eea,Namespace:calico-system,Attempt:0,}" Feb 9 19:17:36.077502 kubelet[2103]: E0209 19:17:36.077472 2103 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:36.077740 kubelet[2103]: W0209 19:17:36.077716 2103 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:36.078024 kubelet[2103]: E0209 19:17:36.078004 2103 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:36.101109 env[1156]: time="2024-02-09T19:17:36.100754560Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:17:36.101109 env[1156]: time="2024-02-09T19:17:36.100815198Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:17:36.101109 env[1156]: time="2024-02-09T19:17:36.100834090Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:17:36.101542 env[1156]: time="2024-02-09T19:17:36.101477430Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eeaabda6ebb3aa03090cc16a0e388ab34ce7a4a377e76e653f84db9480c1feae pid=2552 runtime=io.containerd.runc.v2 Feb 9 19:17:36.126458 systemd[1]: Started cri-containerd-eeaabda6ebb3aa03090cc16a0e388ab34ce7a4a377e76e653f84db9480c1feae.scope. Feb 9 19:17:36.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.143000 audit: BPF prog-id=130 op=LOAD Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2493 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:36.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463666331646638323962643162666638356131353234323664326131 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2493 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:36.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463666331646638323962643162666638356131353234323664326131 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit: BPF prog-id=131 op=LOAD Feb 9 19:17:36.144000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002158b0 items=0 ppid=2493 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:36.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463666331646638323962643162666638356131353234323664326131 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.144000 audit: BPF prog-id=132 op=LOAD Feb 9 19:17:36.144000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002158f8 items=0 ppid=2493 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:36.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463666331646638323962643162666638356131353234323664326131 Feb 9 19:17:36.145000 audit: BPF prog-id=132 op=UNLOAD Feb 9 19:17:36.146000 audit: BPF prog-id=131 op=UNLOAD Feb 9 19:17:36.146000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.146000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.146000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.146000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.146000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.146000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.146000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.146000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.146000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.146000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.146000 audit: BPF prog-id=133 op=LOAD Feb 9 19:17:36.146000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000215d08 items=0 ppid=2493 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:36.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463666331646638323962643162666638356131353234323664326131 Feb 9 19:17:36.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.172000 audit: BPF prog-id=134 op=LOAD Feb 9 19:17:36.172000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.172000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2552 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:36.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565616162646136656262336161303330393063633136613065333838 Feb 9 19:17:36.172000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.172000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2552 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:36.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565616162646136656262336161303330393063633136613065333838 Feb 9 19:17:36.172000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.172000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.172000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.172000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.172000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.172000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.172000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.172000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.172000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.172000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.172000 audit: BPF prog-id=135 op=LOAD Feb 9 19:17:36.172000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00025f5e0 items=0 ppid=2552 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:36.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565616162646136656262336161303330393063633136613065333838 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit: BPF prog-id=136 op=LOAD Feb 9 19:17:36.173000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00025f628 items=0 ppid=2552 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:36.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565616162646136656262336161303330393063633136613065333838 Feb 9 19:17:36.173000 audit: BPF prog-id=136 op=UNLOAD Feb 9 19:17:36.173000 audit: BPF prog-id=135 op=UNLOAD Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:36.173000 audit: BPF prog-id=137 op=LOAD Feb 9 19:17:36.173000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00025fa38 items=0 ppid=2552 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:36.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565616162646136656262336161303330393063633136613065333838 Feb 9 19:17:36.204699 env[1156]: time="2024-02-09T19:17:36.204637670Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-f5ppk,Uid:2b6ab274-40e5-4e36-be8e-140ba3653eea,Namespace:calico-system,Attempt:0,} returns sandbox id \"eeaabda6ebb3aa03090cc16a0e388ab34ce7a4a377e76e653f84db9480c1feae\"" Feb 9 19:17:36.207428 env[1156]: time="2024-02-09T19:17:36.207392870Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:17:36.239452 env[1156]: time="2024-02-09T19:17:36.239382578Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-754d779bf-msj57,Uid:8717aeec-5fb3-4fd3-bb70-f534d87be5a3,Namespace:calico-system,Attempt:0,} returns sandbox id \"dcfc1df829bd1bff85a152426d2a11f5491de985aeeb262faee487cf94f43848\"" Feb 9 19:17:36.559000 audit[2600]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:36.559000 audit[2600]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd90e7a670 a2=0 a3=7ffd90e7a65c items=0 ppid=2242 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:36.559000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:36.560000 audit[2600]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:36.560000 audit[2600]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd90e7a670 a2=0 a3=31030 items=0 ppid=2242 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:36.560000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:38.310302 env[1156]: time="2024-02-09T19:17:38.310229282Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:38.314398 env[1156]: time="2024-02-09T19:17:38.314337411Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:38.318032 env[1156]: time="2024-02-09T19:17:38.317967563Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:38.321840 env[1156]: time="2024-02-09T19:17:38.321800363Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:38.323434 env[1156]: time="2024-02-09T19:17:38.323390087Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 19:17:38.325414 env[1156]: time="2024-02-09T19:17:38.325371882Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 19:17:38.326885 env[1156]: time="2024-02-09T19:17:38.326846195Z" level=info msg="CreateContainer within sandbox \"eeaabda6ebb3aa03090cc16a0e388ab34ce7a4a377e76e653f84db9480c1feae\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:17:38.350433 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2217138671.mount: Deactivated successfully. Feb 9 19:17:38.364970 kubelet[2103]: E0209 19:17:38.363438 2103 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-257w5" podUID=77063012-a45d-44ad-b8fb-c0d671aa8bc5 Feb 9 19:17:38.372359 env[1156]: time="2024-02-09T19:17:38.372283672Z" level=info msg="CreateContainer within sandbox \"eeaabda6ebb3aa03090cc16a0e388ab34ce7a4a377e76e653f84db9480c1feae\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"dec14da819243ec1e006c3f9910d53d31f0ab4fec6ad233d5db889f6379884fa\"" Feb 9 19:17:38.373698 env[1156]: time="2024-02-09T19:17:38.373650736Z" level=info msg="StartContainer for \"dec14da819243ec1e006c3f9910d53d31f0ab4fec6ad233d5db889f6379884fa\"" Feb 9 19:17:38.411720 systemd[1]: Started cri-containerd-dec14da819243ec1e006c3f9910d53d31f0ab4fec6ad233d5db889f6379884fa.scope. Feb 9 19:17:38.477817 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 9 19:17:38.477995 kernel: audit: type=1400 audit(1707506258.450:1146): avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.450000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.450000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2552 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:38.515967 kernel: audit: type=1300 audit(1707506258.450:1146): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2552 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:38.516090 kernel: audit: type=1327 audit(1707506258.450:1146): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465633134646138313932343365633165303036633366393931306435 Feb 9 19:17:38.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465633134646138313932343365633165303036633366393931306435 Feb 9 19:17:38.450000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.561241 kernel: audit: type=1400 audit(1707506258.450:1147): avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.450000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.604749 kernel: audit: type=1400 audit(1707506258.450:1147): avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.604943 kernel: audit: type=1400 audit(1707506258.450:1147): avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.450000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.450000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.647795 kernel: audit: type=1400 audit(1707506258.450:1147): avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.647974 kernel: audit: type=1400 audit(1707506258.450:1147): avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.450000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.450000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.450000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.690570 kernel: audit: type=1400 audit(1707506258.450:1147): avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.690688 kernel: audit: type=1400 audit(1707506258.450:1147): avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.450000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.450000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.450000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.450000 audit: BPF prog-id=138 op=LOAD Feb 9 19:17:38.450000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00028a560 items=0 ppid=2552 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:38.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465633134646138313932343365633165303036633366393931306435 Feb 9 19:17:38.509000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.509000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.509000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.509000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.509000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.509000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.509000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.509000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.509000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.509000 audit: BPF prog-id=139 op=LOAD Feb 9 19:17:38.509000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00028a5a8 items=0 ppid=2552 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:38.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465633134646138313932343365633165303036633366393931306435 Feb 9 19:17:38.524000 audit: BPF prog-id=139 op=UNLOAD Feb 9 19:17:38.524000 audit: BPF prog-id=138 op=UNLOAD Feb 9 19:17:38.524000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.524000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.524000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.524000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.524000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.524000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.524000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.524000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.524000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.524000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:38.524000 audit: BPF prog-id=140 op=LOAD Feb 9 19:17:38.524000 audit[2611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00028a638 items=0 ppid=2552 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:38.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465633134646138313932343365633165303036633366393931306435 Feb 9 19:17:38.693789 env[1156]: time="2024-02-09T19:17:38.692400521Z" level=info msg="StartContainer for \"dec14da819243ec1e006c3f9910d53d31f0ab4fec6ad233d5db889f6379884fa\" returns successfully" Feb 9 19:17:38.694245 systemd[1]: cri-containerd-dec14da819243ec1e006c3f9910d53d31f0ab4fec6ad233d5db889f6379884fa.scope: Deactivated successfully. Feb 9 19:17:38.697000 audit: BPF prog-id=140 op=UNLOAD Feb 9 19:17:38.739866 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dec14da819243ec1e006c3f9910d53d31f0ab4fec6ad233d5db889f6379884fa-rootfs.mount: Deactivated successfully. Feb 9 19:17:39.063053 env[1156]: time="2024-02-09T19:17:39.062978740Z" level=info msg="shim disconnected" id=dec14da819243ec1e006c3f9910d53d31f0ab4fec6ad233d5db889f6379884fa Feb 9 19:17:39.063414 env[1156]: time="2024-02-09T19:17:39.063356839Z" level=warning msg="cleaning up after shim disconnected" id=dec14da819243ec1e006c3f9910d53d31f0ab4fec6ad233d5db889f6379884fa namespace=k8s.io Feb 9 19:17:39.063414 env[1156]: time="2024-02-09T19:17:39.063399326Z" level=info msg="cleaning up dead shim" Feb 9 19:17:39.083336 env[1156]: time="2024-02-09T19:17:39.083250572Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:17:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2649 runtime=io.containerd.runc.v2\n" Feb 9 19:17:39.626068 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3910737720.mount: Deactivated successfully. Feb 9 19:17:40.359895 kubelet[2103]: E0209 19:17:40.359848 2103 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-257w5" podUID=77063012-a45d-44ad-b8fb-c0d671aa8bc5 Feb 9 19:17:41.517265 env[1156]: time="2024-02-09T19:17:41.517201404Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:41.520142 env[1156]: time="2024-02-09T19:17:41.520093718Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:41.522847 env[1156]: time="2024-02-09T19:17:41.522806936Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:41.525522 env[1156]: time="2024-02-09T19:17:41.525477684Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:41.526799 env[1156]: time="2024-02-09T19:17:41.526754042Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 9 19:17:41.528668 env[1156]: time="2024-02-09T19:17:41.527551846Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:17:41.552017 env[1156]: time="2024-02-09T19:17:41.546527435Z" level=info msg="CreateContainer within sandbox \"dcfc1df829bd1bff85a152426d2a11f5491de985aeeb262faee487cf94f43848\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 19:17:41.564995 env[1156]: time="2024-02-09T19:17:41.564925304Z" level=info msg="CreateContainer within sandbox \"dcfc1df829bd1bff85a152426d2a11f5491de985aeeb262faee487cf94f43848\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"58b62a65c1029c5548c2641d2a3b696c51bf5ae80b59289660d9642ef8b231a5\"" Feb 9 19:17:41.568284 env[1156]: time="2024-02-09T19:17:41.567665902Z" level=info msg="StartContainer for \"58b62a65c1029c5548c2641d2a3b696c51bf5ae80b59289660d9642ef8b231a5\"" Feb 9 19:17:41.607169 systemd[1]: Started cri-containerd-58b62a65c1029c5548c2641d2a3b696c51bf5ae80b59289660d9642ef8b231a5.scope. Feb 9 19:17:41.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.627000 audit: BPF prog-id=141 op=LOAD Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2493 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:41.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538623632613635633130323963353534386332363431643261336236 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2493 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:41.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538623632613635633130323963353534386332363431643261336236 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit: BPF prog-id=142 op=LOAD Feb 9 19:17:41.628000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003859c0 items=0 ppid=2493 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:41.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538623632613635633130323963353534386332363431643261336236 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit: BPF prog-id=143 op=LOAD Feb 9 19:17:41.628000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000385a08 items=0 ppid=2493 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:41.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538623632613635633130323963353534386332363431643261336236 Feb 9 19:17:41.628000 audit: BPF prog-id=143 op=UNLOAD Feb 9 19:17:41.628000 audit: BPF prog-id=142 op=UNLOAD Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:41.628000 audit: BPF prog-id=144 op=LOAD Feb 9 19:17:41.628000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000385e18 items=0 ppid=2493 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:41.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538623632613635633130323963353534386332363431643261336236 Feb 9 19:17:41.679184 env[1156]: time="2024-02-09T19:17:41.679109637Z" level=info msg="StartContainer for \"58b62a65c1029c5548c2641d2a3b696c51bf5ae80b59289660d9642ef8b231a5\" returns successfully" Feb 9 19:17:42.360986 kubelet[2103]: E0209 19:17:42.359580 2103 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-257w5" podUID=77063012-a45d-44ad-b8fb-c0d671aa8bc5 Feb 9 19:17:42.541258 systemd[1]: run-containerd-runc-k8s.io-58b62a65c1029c5548c2641d2a3b696c51bf5ae80b59289660d9642ef8b231a5-runc.3izKPz.mount: Deactivated successfully. Feb 9 19:17:42.594851 kubelet[2103]: I0209 19:17:42.594812 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-754d779bf-msj57" podStartSLOduration=2.308522409 podCreationTimestamp="2024-02-09 19:17:35 +0000 UTC" firstStartedPulling="2024-02-09 19:17:36.241128686 +0000 UTC m=+20.148106507" lastFinishedPulling="2024-02-09 19:17:41.527359428 +0000 UTC m=+25.434337258" observedRunningTime="2024-02-09 19:17:42.592890214 +0000 UTC m=+26.499868053" watchObservedRunningTime="2024-02-09 19:17:42.59475316 +0000 UTC m=+26.501731000" Feb 9 19:17:43.580784 kubelet[2103]: I0209 19:17:43.580741 2103 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:17:44.359778 kubelet[2103]: E0209 19:17:44.359726 2103 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-257w5" podUID=77063012-a45d-44ad-b8fb-c0d671aa8bc5 Feb 9 19:17:46.360108 kubelet[2103]: E0209 19:17:46.360062 2103 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-257w5" podUID=77063012-a45d-44ad-b8fb-c0d671aa8bc5 Feb 9 19:17:46.778322 env[1156]: time="2024-02-09T19:17:46.778255724Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:46.781035 env[1156]: time="2024-02-09T19:17:46.780990938Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:46.783546 env[1156]: time="2024-02-09T19:17:46.783504749Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:46.785802 env[1156]: time="2024-02-09T19:17:46.785762739Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:46.788072 env[1156]: time="2024-02-09T19:17:46.786980326Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 19:17:46.795895 env[1156]: time="2024-02-09T19:17:46.795835617Z" level=info msg="CreateContainer within sandbox \"eeaabda6ebb3aa03090cc16a0e388ab34ce7a4a377e76e653f84db9480c1feae\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:17:46.817797 env[1156]: time="2024-02-09T19:17:46.817712300Z" level=info msg="CreateContainer within sandbox \"eeaabda6ebb3aa03090cc16a0e388ab34ce7a4a377e76e653f84db9480c1feae\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"cd995f5e8685abaf4be1e80229fc8203ad12915607a8bcc6f5463da9ad0b647d\"" Feb 9 19:17:46.821080 env[1156]: time="2024-02-09T19:17:46.818665637Z" level=info msg="StartContainer for \"cd995f5e8685abaf4be1e80229fc8203ad12915607a8bcc6f5463da9ad0b647d\"" Feb 9 19:17:46.879666 systemd[1]: run-containerd-runc-k8s.io-cd995f5e8685abaf4be1e80229fc8203ad12915607a8bcc6f5463da9ad0b647d-runc.w8q2yf.mount: Deactivated successfully. Feb 9 19:17:46.885083 systemd[1]: Started cri-containerd-cd995f5e8685abaf4be1e80229fc8203ad12915607a8bcc6f5463da9ad0b647d.scope. Feb 9 19:17:46.934908 kernel: kauditd_printk_skb: 91 callbacks suppressed Feb 9 19:17:46.935116 kernel: audit: type=1400 audit(1707506266.907:1171): avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.907000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.907000 audit[2716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2552 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:46.968234 kernel: audit: type=1300 audit(1707506266.907:1171): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2552 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:46.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364393935663565383638356162616634626531653830323239666338 Feb 9 19:17:47.004536 kernel: audit: type=1327 audit(1707506266.907:1171): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364393935663565383638356162616634626531653830323239666338 Feb 9 19:17:47.004685 kernel: audit: type=1400 audit(1707506266.908:1172): avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.908000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.908000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.046073 kernel: audit: type=1400 audit(1707506266.908:1172): avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.908000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.067998 kernel: audit: type=1400 audit(1707506266.908:1172): avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.068487 env[1156]: time="2024-02-09T19:17:47.068432556Z" level=info msg="StartContainer for \"cd995f5e8685abaf4be1e80229fc8203ad12915607a8bcc6f5463da9ad0b647d\" returns successfully" Feb 9 19:17:46.908000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.908000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.111473 kernel: audit: type=1400 audit(1707506266.908:1172): avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.111634 kernel: audit: type=1400 audit(1707506266.908:1172): avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.111680 kernel: audit: type=1400 audit(1707506266.908:1172): avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.908000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.908000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.154223 kernel: audit: type=1400 audit(1707506266.908:1172): avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.908000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.908000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.908000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.908000 audit: BPF prog-id=145 op=LOAD Feb 9 19:17:46.908000 audit[2716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003d8040 items=0 ppid=2552 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:46.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364393935663565383638356162616634626531653830323239666338 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit: BPF prog-id=146 op=LOAD Feb 9 19:17:46.934000 audit[2716]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003d8088 items=0 ppid=2552 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:46.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364393935663565383638356162616634626531653830323239666338 Feb 9 19:17:46.934000 audit: BPF prog-id=146 op=UNLOAD Feb 9 19:17:46.934000 audit: BPF prog-id=145 op=UNLOAD Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:46.934000 audit: BPF prog-id=147 op=LOAD Feb 9 19:17:46.934000 audit[2716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003d8118 items=0 ppid=2552 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:46.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364393935663565383638356162616634626531653830323239666338 Feb 9 19:17:47.929738 env[1156]: time="2024-02-09T19:17:47.929645608Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:17:47.936192 systemd[1]: cri-containerd-cd995f5e8685abaf4be1e80229fc8203ad12915607a8bcc6f5463da9ad0b647d.scope: Deactivated successfully. Feb 9 19:17:47.939000 audit: BPF prog-id=147 op=UNLOAD Feb 9 19:17:47.945442 kubelet[2103]: I0209 19:17:47.945412 2103 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:17:47.977189 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cd995f5e8685abaf4be1e80229fc8203ad12915607a8bcc6f5463da9ad0b647d-rootfs.mount: Deactivated successfully. Feb 9 19:17:47.992977 kubelet[2103]: I0209 19:17:47.992890 2103 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:17:48.000627 systemd[1]: Created slice kubepods-burstable-pod63ac1e07_6f01_4725_930f_57f59f86c2e5.slice. Feb 9 19:17:48.008396 kubelet[2103]: I0209 19:17:48.008349 2103 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:17:48.013980 kubelet[2103]: I0209 19:17:48.009907 2103 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:17:48.022147 systemd[1]: Created slice kubepods-besteffort-pod8feb3f03_a392_4e58_84f6_be28625a1815.slice. Feb 9 19:17:48.031814 systemd[1]: Created slice kubepods-burstable-podcdb6f9d2_7200_4e22_8b78_b5312f5c6eaf.slice. Feb 9 19:17:48.184666 kubelet[2103]: I0209 19:17:48.183973 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8feb3f03-a392-4e58-84f6-be28625a1815-tigera-ca-bundle\") pod \"calico-kube-controllers-54658fdfbb-crt8d\" (UID: \"8feb3f03-a392-4e58-84f6-be28625a1815\") " pod="calico-system/calico-kube-controllers-54658fdfbb-crt8d" Feb 9 19:17:48.184666 kubelet[2103]: I0209 19:17:48.184132 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/63ac1e07-6f01-4725-930f-57f59f86c2e5-config-volume\") pod \"coredns-5d78c9869d-vb9zx\" (UID: \"63ac1e07-6f01-4725-930f-57f59f86c2e5\") " pod="kube-system/coredns-5d78c9869d-vb9zx" Feb 9 19:17:48.184666 kubelet[2103]: I0209 19:17:48.184207 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q6hx8\" (UniqueName: \"kubernetes.io/projected/63ac1e07-6f01-4725-930f-57f59f86c2e5-kube-api-access-q6hx8\") pod \"coredns-5d78c9869d-vb9zx\" (UID: \"63ac1e07-6f01-4725-930f-57f59f86c2e5\") " pod="kube-system/coredns-5d78c9869d-vb9zx" Feb 9 19:17:48.184666 kubelet[2103]: I0209 19:17:48.184301 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf-config-volume\") pod \"coredns-5d78c9869d-djfsf\" (UID: \"cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf\") " pod="kube-system/coredns-5d78c9869d-djfsf" Feb 9 19:17:48.184666 kubelet[2103]: I0209 19:17:48.184397 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c596k\" (UniqueName: \"kubernetes.io/projected/8feb3f03-a392-4e58-84f6-be28625a1815-kube-api-access-c596k\") pod \"calico-kube-controllers-54658fdfbb-crt8d\" (UID: \"8feb3f03-a392-4e58-84f6-be28625a1815\") " pod="calico-system/calico-kube-controllers-54658fdfbb-crt8d" Feb 9 19:17:48.185242 kubelet[2103]: I0209 19:17:48.184476 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5vfs5\" (UniqueName: \"kubernetes.io/projected/cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf-kube-api-access-5vfs5\") pod \"coredns-5d78c9869d-djfsf\" (UID: \"cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf\") " pod="kube-system/coredns-5d78c9869d-djfsf" Feb 9 19:17:48.327862 env[1156]: time="2024-02-09T19:17:48.327795123Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-54658fdfbb-crt8d,Uid:8feb3f03-a392-4e58-84f6-be28625a1815,Namespace:calico-system,Attempt:0,}" Feb 9 19:17:48.338709 env[1156]: time="2024-02-09T19:17:48.338648856Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-djfsf,Uid:cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf,Namespace:kube-system,Attempt:0,}" Feb 9 19:17:48.364913 systemd[1]: Created slice kubepods-besteffort-pod77063012_a45d_44ad_b8fb_c0d671aa8bc5.slice. Feb 9 19:17:48.368713 env[1156]: time="2024-02-09T19:17:48.368659790Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-257w5,Uid:77063012-a45d-44ad-b8fb-c0d671aa8bc5,Namespace:calico-system,Attempt:0,}" Feb 9 19:17:48.606684 env[1156]: time="2024-02-09T19:17:48.606520612Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-vb9zx,Uid:63ac1e07-6f01-4725-930f-57f59f86c2e5,Namespace:kube-system,Attempt:0,}" Feb 9 19:17:49.022027 env[1156]: time="2024-02-09T19:17:49.021702428Z" level=info msg="shim disconnected" id=cd995f5e8685abaf4be1e80229fc8203ad12915607a8bcc6f5463da9ad0b647d Feb 9 19:17:49.022027 env[1156]: time="2024-02-09T19:17:49.021764965Z" level=warning msg="cleaning up after shim disconnected" id=cd995f5e8685abaf4be1e80229fc8203ad12915607a8bcc6f5463da9ad0b647d namespace=k8s.io Feb 9 19:17:49.022027 env[1156]: time="2024-02-09T19:17:49.021780740Z" level=info msg="cleaning up dead shim" Feb 9 19:17:49.034277 env[1156]: time="2024-02-09T19:17:49.034205976Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:17:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2767 runtime=io.containerd.runc.v2\n" Feb 9 19:17:49.255542 env[1156]: time="2024-02-09T19:17:49.255440416Z" level=error msg="Failed to destroy network for sandbox \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.256129 env[1156]: time="2024-02-09T19:17:49.256053952Z" level=error msg="encountered an error cleaning up failed sandbox \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.256275 env[1156]: time="2024-02-09T19:17:49.256154191Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-vb9zx,Uid:63ac1e07-6f01-4725-930f-57f59f86c2e5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.256671 kubelet[2103]: E0209 19:17:49.256637 2103 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.257244 kubelet[2103]: E0209 19:17:49.256748 2103 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-vb9zx" Feb 9 19:17:49.257244 kubelet[2103]: E0209 19:17:49.256811 2103 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-vb9zx" Feb 9 19:17:49.257244 kubelet[2103]: E0209 19:17:49.256912 2103 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-vb9zx_kube-system(63ac1e07-6f01-4725-930f-57f59f86c2e5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-vb9zx_kube-system(63ac1e07-6f01-4725-930f-57f59f86c2e5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-vb9zx" podUID=63ac1e07-6f01-4725-930f-57f59f86c2e5 Feb 9 19:17:49.286912 env[1156]: time="2024-02-09T19:17:49.285774818Z" level=error msg="Failed to destroy network for sandbox \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.286912 env[1156]: time="2024-02-09T19:17:49.286349280Z" level=error msg="encountered an error cleaning up failed sandbox \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.286912 env[1156]: time="2024-02-09T19:17:49.286435829Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-54658fdfbb-crt8d,Uid:8feb3f03-a392-4e58-84f6-be28625a1815,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.287324 kubelet[2103]: E0209 19:17:49.286757 2103 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.287324 kubelet[2103]: E0209 19:17:49.286833 2103 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-54658fdfbb-crt8d" Feb 9 19:17:49.287324 kubelet[2103]: E0209 19:17:49.286871 2103 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-54658fdfbb-crt8d" Feb 9 19:17:49.287540 kubelet[2103]: E0209 19:17:49.286974 2103 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-54658fdfbb-crt8d_calico-system(8feb3f03-a392-4e58-84f6-be28625a1815)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-54658fdfbb-crt8d_calico-system(8feb3f03-a392-4e58-84f6-be28625a1815)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-54658fdfbb-crt8d" podUID=8feb3f03-a392-4e58-84f6-be28625a1815 Feb 9 19:17:49.305707 env[1156]: time="2024-02-09T19:17:49.305616643Z" level=error msg="Failed to destroy network for sandbox \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.306197 env[1156]: time="2024-02-09T19:17:49.306130313Z" level=error msg="encountered an error cleaning up failed sandbox \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.306332 env[1156]: time="2024-02-09T19:17:49.306255504Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-djfsf,Uid:cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.306618 kubelet[2103]: E0209 19:17:49.306556 2103 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.306618 kubelet[2103]: E0209 19:17:49.306623 2103 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-djfsf" Feb 9 19:17:49.306917 kubelet[2103]: E0209 19:17:49.306658 2103 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-djfsf" Feb 9 19:17:49.306917 kubelet[2103]: E0209 19:17:49.306741 2103 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-djfsf_kube-system(cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-djfsf_kube-system(cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-djfsf" podUID=cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf Feb 9 19:17:49.312684 env[1156]: time="2024-02-09T19:17:49.312611872Z" level=error msg="Failed to destroy network for sandbox \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.313117 env[1156]: time="2024-02-09T19:17:49.313064842Z" level=error msg="encountered an error cleaning up failed sandbox \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.313256 env[1156]: time="2024-02-09T19:17:49.313145908Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-257w5,Uid:77063012-a45d-44ad-b8fb-c0d671aa8bc5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.313432 kubelet[2103]: E0209 19:17:49.313390 2103 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.313539 kubelet[2103]: E0209 19:17:49.313447 2103 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-257w5" Feb 9 19:17:49.313539 kubelet[2103]: E0209 19:17:49.313484 2103 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-257w5" Feb 9 19:17:49.315647 kubelet[2103]: E0209 19:17:49.313964 2103 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-257w5_calico-system(77063012-a45d-44ad-b8fb-c0d671aa8bc5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-257w5_calico-system(77063012-a45d-44ad-b8fb-c0d671aa8bc5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-257w5" podUID=77063012-a45d-44ad-b8fb-c0d671aa8bc5 Feb 9 19:17:49.598371 kubelet[2103]: I0209 19:17:49.596574 2103 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Feb 9 19:17:49.598573 env[1156]: time="2024-02-09T19:17:49.597759275Z" level=info msg="StopPodSandbox for \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\"" Feb 9 19:17:49.601894 kubelet[2103]: I0209 19:17:49.601303 2103 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Feb 9 19:17:49.602163 env[1156]: time="2024-02-09T19:17:49.602090745Z" level=info msg="StopPodSandbox for \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\"" Feb 9 19:17:49.611838 env[1156]: time="2024-02-09T19:17:49.610456658Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:17:49.612197 kubelet[2103]: I0209 19:17:49.612070 2103 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Feb 9 19:17:49.613612 env[1156]: time="2024-02-09T19:17:49.612802750Z" level=info msg="StopPodSandbox for \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\"" Feb 9 19:17:49.617003 kubelet[2103]: I0209 19:17:49.615830 2103 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Feb 9 19:17:49.622216 env[1156]: time="2024-02-09T19:17:49.620622786Z" level=info msg="StopPodSandbox for \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\"" Feb 9 19:17:49.714604 env[1156]: time="2024-02-09T19:17:49.714510564Z" level=error msg="StopPodSandbox for \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\" failed" error="failed to destroy network for sandbox \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.714907 kubelet[2103]: E0209 19:17:49.714876 2103 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Feb 9 19:17:49.715230 kubelet[2103]: E0209 19:17:49.714960 2103 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97} Feb 9 19:17:49.715230 kubelet[2103]: E0209 19:17:49.715015 2103 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8feb3f03-a392-4e58-84f6-be28625a1815\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:17:49.715230 kubelet[2103]: E0209 19:17:49.715066 2103 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8feb3f03-a392-4e58-84f6-be28625a1815\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-54658fdfbb-crt8d" podUID=8feb3f03-a392-4e58-84f6-be28625a1815 Feb 9 19:17:49.729904 env[1156]: time="2024-02-09T19:17:49.729810803Z" level=error msg="StopPodSandbox for \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\" failed" error="failed to destroy network for sandbox \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.730209 kubelet[2103]: E0209 19:17:49.730170 2103 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Feb 9 19:17:49.730345 kubelet[2103]: E0209 19:17:49.730226 2103 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7} Feb 9 19:17:49.730345 kubelet[2103]: E0209 19:17:49.730279 2103 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"77063012-a45d-44ad-b8fb-c0d671aa8bc5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:17:49.730345 kubelet[2103]: E0209 19:17:49.730330 2103 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"77063012-a45d-44ad-b8fb-c0d671aa8bc5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-257w5" podUID=77063012-a45d-44ad-b8fb-c0d671aa8bc5 Feb 9 19:17:49.750066 env[1156]: time="2024-02-09T19:17:49.749990817Z" level=error msg="StopPodSandbox for \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\" failed" error="failed to destroy network for sandbox \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.750299 kubelet[2103]: E0209 19:17:49.750272 2103 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Feb 9 19:17:49.750429 kubelet[2103]: E0209 19:17:49.750325 2103 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53} Feb 9 19:17:49.750429 kubelet[2103]: E0209 19:17:49.750381 2103 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"63ac1e07-6f01-4725-930f-57f59f86c2e5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:17:49.750429 kubelet[2103]: E0209 19:17:49.750429 2103 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"63ac1e07-6f01-4725-930f-57f59f86c2e5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-vb9zx" podUID=63ac1e07-6f01-4725-930f-57f59f86c2e5 Feb 9 19:17:49.751591 env[1156]: time="2024-02-09T19:17:49.751505116Z" level=error msg="StopPodSandbox for \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\" failed" error="failed to destroy network for sandbox \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:17:49.751924 kubelet[2103]: E0209 19:17:49.751890 2103 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Feb 9 19:17:49.752096 kubelet[2103]: E0209 19:17:49.751965 2103 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f} Feb 9 19:17:49.752096 kubelet[2103]: E0209 19:17:49.752015 2103 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:17:49.752096 kubelet[2103]: E0209 19:17:49.752064 2103 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-djfsf" podUID=cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf Feb 9 19:17:50.048772 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f-shm.mount: Deactivated successfully. Feb 9 19:17:50.048986 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97-shm.mount: Deactivated successfully. Feb 9 19:17:50.049210 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7-shm.mount: Deactivated successfully. Feb 9 19:17:53.660612 kubelet[2103]: I0209 19:17:53.660187 2103 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:17:53.793187 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 19:17:53.793376 kernel: audit: type=1325 audit(1707506273.770:1178): table=filter:95 family=2 entries=15 op=nft_register_rule pid=2988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:53.770000 audit[2988]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:53.826668 kernel: audit: type=1300 audit(1707506273.770:1178): arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffdc658a390 a2=0 a3=7ffdc658a37c items=0 ppid=2242 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:53.770000 audit[2988]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffdc658a390 a2=0 a3=7ffdc658a37c items=0 ppid=2242 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:53.770000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:53.843092 kernel: audit: type=1327 audit(1707506273.770:1178): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:53.770000 audit[2988]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:53.892623 kernel: audit: type=1325 audit(1707506273.770:1179): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:53.892800 kernel: audit: type=1300 audit(1707506273.770:1179): arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffdc658a390 a2=0 a3=7ffdc658a37c items=0 ppid=2242 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:53.770000 audit[2988]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffdc658a390 a2=0 a3=7ffdc658a37c items=0 ppid=2242 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:53.770000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:53.909035 kernel: audit: type=1327 audit(1707506273.770:1179): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:56.434594 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1651067721.mount: Deactivated successfully. Feb 9 19:17:56.495344 env[1156]: time="2024-02-09T19:17:56.495270276Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:56.498359 env[1156]: time="2024-02-09T19:17:56.498312872Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:56.500524 env[1156]: time="2024-02-09T19:17:56.500488730Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:56.503307 env[1156]: time="2024-02-09T19:17:56.503153951Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:56.503566 env[1156]: time="2024-02-09T19:17:56.503525800Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 19:17:56.527533 env[1156]: time="2024-02-09T19:17:56.527483094Z" level=info msg="CreateContainer within sandbox \"eeaabda6ebb3aa03090cc16a0e388ab34ce7a4a377e76e653f84db9480c1feae\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:17:56.547885 env[1156]: time="2024-02-09T19:17:56.545153729Z" level=info msg="CreateContainer within sandbox \"eeaabda6ebb3aa03090cc16a0e388ab34ce7a4a377e76e653f84db9480c1feae\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"c2fdf6cf7c6108010741b89298495bf493ef687fcd2848998964175dd3dcd160\"" Feb 9 19:17:56.548472 env[1156]: time="2024-02-09T19:17:56.548377693Z" level=info msg="StartContainer for \"c2fdf6cf7c6108010741b89298495bf493ef687fcd2848998964175dd3dcd160\"" Feb 9 19:17:56.584796 systemd[1]: Started cri-containerd-c2fdf6cf7c6108010741b89298495bf493ef687fcd2848998964175dd3dcd160.scope. Feb 9 19:17:56.609000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.631953 kernel: audit: type=1400 audit(1707506276.609:1180): avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.664302 kernel: audit: type=1300 audit(1707506276.609:1180): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2552 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:56.609000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2552 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:56.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332666466366366376336313038303130373431623839323938343935 Feb 9 19:17:56.609000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.714184 kernel: audit: type=1327 audit(1707506276.609:1180): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332666466366366376336313038303130373431623839323938343935 Feb 9 19:17:56.714329 kernel: audit: type=1400 audit(1707506276.609:1181): avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.609000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.609000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.609000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.609000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.609000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.609000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.609000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.609000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.609000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.609000 audit: BPF prog-id=148 op=LOAD Feb 9 19:17:56.609000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002c1ca0 items=0 ppid=2552 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:56.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332666466366366376336313038303130373431623839323938343935 Feb 9 19:17:56.662000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.662000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.662000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.662000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.662000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.662000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.662000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.662000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.662000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.662000 audit: BPF prog-id=149 op=LOAD Feb 9 19:17:56.662000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002c1ce8 items=0 ppid=2552 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:56.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332666466366366376336313038303130373431623839323938343935 Feb 9 19:17:56.663000 audit: BPF prog-id=149 op=UNLOAD Feb 9 19:17:56.663000 audit: BPF prog-id=148 op=UNLOAD Feb 9 19:17:56.663000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.663000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.663000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.663000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.663000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.663000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.663000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.663000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.663000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.663000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.663000 audit: BPF prog-id=150 op=LOAD Feb 9 19:17:56.663000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002c1d78 items=0 ppid=2552 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:56.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332666466366366376336313038303130373431623839323938343935 Feb 9 19:17:56.751891 env[1156]: time="2024-02-09T19:17:56.751833608Z" level=info msg="StartContainer for \"c2fdf6cf7c6108010741b89298495bf493ef687fcd2848998964175dd3dcd160\" returns successfully" Feb 9 19:17:56.885389 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:17:56.885574 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:17:57.666264 kubelet[2103]: I0209 19:17:57.665898 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-f5ppk" podStartSLOduration=2.367824126 podCreationTimestamp="2024-02-09 19:17:35 +0000 UTC" firstStartedPulling="2024-02-09 19:17:36.206173993 +0000 UTC m=+20.113151805" lastFinishedPulling="2024-02-09 19:17:56.504196897 +0000 UTC m=+40.411174720" observedRunningTime="2024-02-09 19:17:57.664164598 +0000 UTC m=+41.571142459" watchObservedRunningTime="2024-02-09 19:17:57.665847041 +0000 UTC m=+41.572824881" Feb 9 19:17:57.685530 systemd[1]: run-containerd-runc-k8s.io-c2fdf6cf7c6108010741b89298495bf493ef687fcd2848998964175dd3dcd160-runc.hxqD5H.mount: Deactivated successfully. Feb 9 19:17:58.335000 audit[3121]: AVC avc: denied { write } for pid=3121 comm="tee" name="fd" dev="proc" ino=23910 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:17:58.335000 audit[3121]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3426a91d a2=241 a3=1b6 items=1 ppid=3084 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:58.335000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:17:58.335000 audit: PATH item=0 name="/dev/fd/63" inode=23902 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:17:58.335000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:17:58.337000 audit[3119]: AVC avc: denied { write } for pid=3119 comm="tee" name="fd" dev="proc" ino=23912 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:17:58.337000 audit[3119]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf9cdc91e a2=241 a3=1b6 items=1 ppid=3082 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:58.337000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:17:58.337000 audit: PATH item=0 name="/dev/fd/63" inode=24813 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:17:58.337000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:17:58.337000 audit[3124]: AVC avc: denied { write } for pid=3124 comm="tee" name="fd" dev="proc" ino=23916 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:17:58.337000 audit[3124]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe3c8692d a2=241 a3=1b6 items=1 ppid=3090 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:58.337000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:17:58.337000 audit: PATH item=0 name="/dev/fd/63" inode=23903 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:17:58.337000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:17:58.340000 audit[3116]: AVC avc: denied { write } for pid=3116 comm="tee" name="fd" dev="proc" ino=23920 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:17:58.340000 audit[3116]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0ec7c92f a2=241 a3=1b6 items=1 ppid=3092 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:58.340000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:17:58.340000 audit: PATH item=0 name="/dev/fd/63" inode=24810 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:17:58.352000 audit[3114]: AVC avc: denied { write } for pid=3114 comm="tee" name="fd" dev="proc" ino=23926 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:17:58.352000 audit[3114]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb5a9192d a2=241 a3=1b6 items=1 ppid=3086 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:58.352000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:17:58.352000 audit: PATH item=0 name="/dev/fd/63" inode=24807 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:17:58.352000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:17:58.340000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:17:58.386000 audit[3151]: AVC avc: denied { write } for pid=3151 comm="tee" name="fd" dev="proc" ino=24834 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:17:58.386000 audit[3151]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca33b092d a2=241 a3=1b6 items=1 ppid=3101 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:58.386000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:17:58.386000 audit: PATH item=0 name="/dev/fd/63" inode=23930 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:17:58.386000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:17:58.392000 audit[3157]: AVC avc: denied { write } for pid=3157 comm="tee" name="fd" dev="proc" ino=23940 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:17:58.392000 audit[3157]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff843a592e a2=241 a3=1b6 items=1 ppid=3096 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:58.392000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:17:58.392000 audit: PATH item=0 name="/dev/fd/63" inode=23937 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:17:58.392000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:17:58.684035 systemd[1]: run-containerd-runc-k8s.io-c2fdf6cf7c6108010741b89298495bf493ef687fcd2848998964175dd3dcd160-runc.PWlZIK.mount: Deactivated successfully. Feb 9 19:17:59.001102 kernel: kauditd_printk_skb: 74 callbacks suppressed Feb 9 19:17:59.001275 kernel: audit: type=1400 audit(1707506278.972:1193): avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.001326 kernel: audit: type=1400 audit(1707506278.972:1193): avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:58.972000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:58.972000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.062516 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:17:59.062676 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:17:59.062721 kernel: audit: type=1400 audit(1707506278.972:1193): avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.062773 kernel: audit: backlog limit exceeded Feb 9 19:17:59.062815 kernel: audit: type=1400 audit(1707506278.972:1193): avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:58.972000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:58.972000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:58.972000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.103465 kernel: audit: type=1400 audit(1707506278.972:1193): avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:58.972000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:58.972000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.147415 kernel: audit: type=1400 audit(1707506278.972:1193): avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.147564 kernel: audit: type=1400 audit(1707506278.972:1193): avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:58.972000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:58.972000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:58.972000 audit: BPF prog-id=151 op=LOAD Feb 9 19:17:58.972000 audit[3242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcf57a2210 a2=70 a3=7feaff251000 items=0 ppid=3102 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:58.972000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:17:59.020000 audit: BPF prog-id=151 op=UNLOAD Feb 9 19:17:59.020000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.020000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.020000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.020000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.020000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.020000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.020000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.020000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.020000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.020000 audit: BPF prog-id=152 op=LOAD Feb 9 19:17:59.020000 audit[3242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcf57a2210 a2=70 a3=6e items=0 ppid=3102 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:59.020000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:17:59.020000 audit: BPF prog-id=152 op=UNLOAD Feb 9 19:17:59.020000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.020000 audit[3242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcf57a21c0 a2=70 a3=7ffcf57a2210 items=0 ppid=3102 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:59.020000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:17:59.021000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.021000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.021000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.021000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.021000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.021000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.021000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.021000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.021000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.021000 audit: BPF prog-id=153 op=LOAD Feb 9 19:17:59.021000 audit[3242]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffcf57a21a0 a2=70 a3=7ffcf57a2210 items=0 ppid=3102 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:59.021000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:17:59.021000 audit: BPF prog-id=153 op=UNLOAD Feb 9 19:17:59.021000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.021000 audit[3242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf57a2280 a2=70 a3=0 items=0 ppid=3102 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:59.021000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:17:59.021000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.021000 audit[3242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf57a2270 a2=70 a3=0 items=0 ppid=3102 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:59.021000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:17:59.021000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.021000 audit[3242]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffcf57a22b0 a2=70 a3=0 items=0 ppid=3102 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:59.021000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:17:59.022000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.022000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.022000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.022000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.022000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.022000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.022000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.022000 audit[3242]: AVC avc: denied { perfmon } for pid=3242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.022000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.022000 audit[3242]: AVC avc: denied { bpf } for pid=3242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.022000 audit[3242]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffcf57a21d0 a2=70 a3=ffffffff items=0 ppid=3102 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:59.022000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:17:59.149000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.149000 audit[3247]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdd706da00 a2=70 a3=fff80800 items=0 ppid=3102 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:59.149000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:17:59.149000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:59.149000 audit[3247]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdd706d8d0 a2=70 a3=3 items=0 ppid=3102 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:59.149000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:17:59.158000 audit: BPF prog-id=154 op=UNLOAD Feb 9 19:17:59.227000 audit[3268]: NETFILTER_CFG table=nat:97 family=2 entries=16 op=nft_register_chain pid=3268 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:17:59.227000 audit[3268]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffcfa2bde20 a2=0 a3=7ffcfa2bde0c items=0 ppid=3102 pid=3268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:59.227000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:17:59.229000 audit[3269]: NETFILTER_CFG table=mangle:98 family=2 entries=19 op=nft_register_chain pid=3269 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:17:59.229000 audit[3269]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fff0a3dc9c0 a2=0 a3=55c63203b000 items=0 ppid=3102 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:59.229000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:17:59.233000 audit[3267]: NETFILTER_CFG table=raw:99 family=2 entries=19 op=nft_register_chain pid=3267 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:17:59.233000 audit[3267]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffc90f7cfa0 a2=0 a3=55a18d30c000 items=0 ppid=3102 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:59.233000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:17:59.239000 audit[3274]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3274 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:17:59.239000 audit[3274]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7fff80b4e420 a2=0 a3=5650b0a12000 items=0 ppid=3102 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:59.239000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:17:59.743803 systemd-networkd[1030]: vxlan.calico: Link UP Feb 9 19:17:59.743831 systemd-networkd[1030]: vxlan.calico: Gained carrier Feb 9 19:18:00.359915 env[1156]: time="2024-02-09T19:18:00.359859632Z" level=info msg="StopPodSandbox for \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\"" Feb 9 19:18:00.470316 env[1156]: 2024-02-09 19:18:00.428 [INFO][3296] k8s.go 578: Cleaning up netns ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Feb 9 19:18:00.470316 env[1156]: 2024-02-09 19:18:00.431 [INFO][3296] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" iface="eth0" netns="/var/run/netns/cni-58d5f255-4283-d014-e831-3837f0d60f98" Feb 9 19:18:00.470316 env[1156]: 2024-02-09 19:18:00.431 [INFO][3296] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" iface="eth0" netns="/var/run/netns/cni-58d5f255-4283-d014-e831-3837f0d60f98" Feb 9 19:18:00.470316 env[1156]: 2024-02-09 19:18:00.432 [INFO][3296] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" iface="eth0" netns="/var/run/netns/cni-58d5f255-4283-d014-e831-3837f0d60f98" Feb 9 19:18:00.470316 env[1156]: 2024-02-09 19:18:00.432 [INFO][3296] k8s.go 585: Releasing IP address(es) ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Feb 9 19:18:00.470316 env[1156]: 2024-02-09 19:18:00.432 [INFO][3296] utils.go 188: Calico CNI releasing IP address ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Feb 9 19:18:00.470316 env[1156]: 2024-02-09 19:18:00.457 [INFO][3302] ipam_plugin.go 415: Releasing address using handleID ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" HandleID="k8s-pod-network.56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" Feb 9 19:18:00.470316 env[1156]: 2024-02-09 19:18:00.457 [INFO][3302] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:00.470316 env[1156]: 2024-02-09 19:18:00.458 [INFO][3302] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:00.470316 env[1156]: 2024-02-09 19:18:00.465 [WARNING][3302] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" HandleID="k8s-pod-network.56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" Feb 9 19:18:00.470316 env[1156]: 2024-02-09 19:18:00.465 [INFO][3302] ipam_plugin.go 443: Releasing address using workloadID ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" HandleID="k8s-pod-network.56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" Feb 9 19:18:00.470316 env[1156]: 2024-02-09 19:18:00.467 [INFO][3302] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:00.470316 env[1156]: 2024-02-09 19:18:00.468 [INFO][3296] k8s.go 591: Teardown processing complete. ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Feb 9 19:18:00.475020 systemd[1]: run-netns-cni\x2d58d5f255\x2d4283\x2dd014\x2de831\x2d3837f0d60f98.mount: Deactivated successfully. Feb 9 19:18:00.476801 env[1156]: time="2024-02-09T19:18:00.476743757Z" level=info msg="TearDown network for sandbox \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\" successfully" Feb 9 19:18:00.476981 env[1156]: time="2024-02-09T19:18:00.476925355Z" level=info msg="StopPodSandbox for \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\" returns successfully" Feb 9 19:18:00.477905 env[1156]: time="2024-02-09T19:18:00.477859772Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-257w5,Uid:77063012-a45d-44ad-b8fb-c0d671aa8bc5,Namespace:calico-system,Attempt:1,}" Feb 9 19:18:00.637237 systemd-networkd[1030]: calicde1cdb5044: Link UP Feb 9 19:18:00.653961 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:18:00.654091 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicde1cdb5044: link becomes ready Feb 9 19:18:00.663368 systemd-networkd[1030]: calicde1cdb5044: Gained carrier Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.545 [INFO][3309] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0 csi-node-driver- calico-system 77063012-a45d-44ad-b8fb-c0d671aa8bc5 713 0 2024-02-09 19:17:35 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal csi-node-driver-257w5 eth0 default [] [] [kns.calico-system ksa.calico-system.default] calicde1cdb5044 [] []}} ContainerID="69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" Namespace="calico-system" Pod="csi-node-driver-257w5" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-" Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.545 [INFO][3309] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" Namespace="calico-system" Pod="csi-node-driver-257w5" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.577 [INFO][3320] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" HandleID="k8s-pod-network.69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.589 [INFO][3320] ipam_plugin.go 268: Auto assigning IP ContainerID="69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" HandleID="k8s-pod-network.69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004a1b00), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", "pod":"csi-node-driver-257w5", "timestamp":"2024-02-09 19:18:00.577346953 +0000 UTC"}, Hostname:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.589 [INFO][3320] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.589 [INFO][3320] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.589 [INFO][3320] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal' Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.591 [INFO][3320] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.597 [INFO][3320] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.602 [INFO][3320] ipam.go 489: Trying affinity for 192.168.21.128/26 host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.605 [INFO][3320] ipam.go 155: Attempting to load block cidr=192.168.21.128/26 host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.609 [INFO][3320] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.128/26 host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.609 [INFO][3320] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.128/26 handle="k8s-pod-network.69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.611 [INFO][3320] ipam.go 1682: Creating new handle: k8s-pod-network.69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.616 [INFO][3320] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.128/26 handle="k8s-pod-network.69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.626 [INFO][3320] ipam.go 1216: Successfully claimed IPs: [192.168.21.129/26] block=192.168.21.128/26 handle="k8s-pod-network.69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.626 [INFO][3320] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.129/26] handle="k8s-pod-network.69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.626 [INFO][3320] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:00.681479 env[1156]: 2024-02-09 19:18:00.626 [INFO][3320] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.129/26] IPv6=[] ContainerID="69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" HandleID="k8s-pod-network.69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" Feb 9 19:18:00.682666 env[1156]: 2024-02-09 19:18:00.629 [INFO][3309] k8s.go 385: Populated endpoint ContainerID="69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" Namespace="calico-system" Pod="csi-node-driver-257w5" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"77063012-a45d-44ad-b8fb-c0d671aa8bc5", ResourceVersion:"713", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-257w5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calicde1cdb5044", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:00.682666 env[1156]: 2024-02-09 19:18:00.630 [INFO][3309] k8s.go 386: Calico CNI using IPs: [192.168.21.129/32] ContainerID="69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" Namespace="calico-system" Pod="csi-node-driver-257w5" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" Feb 9 19:18:00.682666 env[1156]: 2024-02-09 19:18:00.630 [INFO][3309] dataplane_linux.go 68: Setting the host side veth name to calicde1cdb5044 ContainerID="69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" Namespace="calico-system" Pod="csi-node-driver-257w5" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" Feb 9 19:18:00.682666 env[1156]: 2024-02-09 19:18:00.663 [INFO][3309] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" Namespace="calico-system" Pod="csi-node-driver-257w5" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" Feb 9 19:18:00.682666 env[1156]: 2024-02-09 19:18:00.667 [INFO][3309] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" Namespace="calico-system" Pod="csi-node-driver-257w5" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"77063012-a45d-44ad-b8fb-c0d671aa8bc5", ResourceVersion:"713", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb", Pod:"csi-node-driver-257w5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calicde1cdb5044", MAC:"d6:05:8c:58:34:28", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:00.682666 env[1156]: 2024-02-09 19:18:00.679 [INFO][3309] k8s.go 491: Wrote updated endpoint to datastore ContainerID="69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb" Namespace="calico-system" Pod="csi-node-driver-257w5" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" Feb 9 19:18:00.704008 env[1156]: time="2024-02-09T19:18:00.703092504Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:18:00.704008 env[1156]: time="2024-02-09T19:18:00.703140976Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:18:00.704008 env[1156]: time="2024-02-09T19:18:00.703159821Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:18:00.704008 env[1156]: time="2024-02-09T19:18:00.703320446Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb pid=3345 runtime=io.containerd.runc.v2 Feb 9 19:18:00.734130 systemd[1]: Started cri-containerd-69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb.scope. Feb 9 19:18:00.762000 audit[3367]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3367 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:18:00.762000 audit[3367]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffe0ae20040 a2=0 a3=7ffe0ae2002c items=0 ppid=3102 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:00.762000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:18:00.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.776000 audit: BPF prog-id=155 op=LOAD Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3345 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:00.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656638383838386534373762626436306366353364653862613439 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3345 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:00.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656638383838386534373762626436306366353364653862613439 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit: BPF prog-id=156 op=LOAD Feb 9 19:18:00.777000 audit[3354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000290360 items=0 ppid=3345 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:00.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656638383838386534373762626436306366353364653862613439 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit: BPF prog-id=157 op=LOAD Feb 9 19:18:00.777000 audit[3354]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0002903a8 items=0 ppid=3345 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:00.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656638383838386534373762626436306366353364653862613439 Feb 9 19:18:00.777000 audit: BPF prog-id=157 op=UNLOAD Feb 9 19:18:00.777000 audit: BPF prog-id=156 op=UNLOAD Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:00.777000 audit: BPF prog-id=158 op=LOAD Feb 9 19:18:00.777000 audit[3354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0002907b8 items=0 ppid=3345 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:00.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656638383838386534373762626436306366353364653862613439 Feb 9 19:18:00.798804 env[1156]: time="2024-02-09T19:18:00.798751381Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-257w5,Uid:77063012-a45d-44ad-b8fb-c0d671aa8bc5,Namespace:calico-system,Attempt:1,} returns sandbox id \"69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb\"" Feb 9 19:18:00.803919 env[1156]: time="2024-02-09T19:18:00.801230563Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:18:01.056231 systemd-networkd[1030]: vxlan.calico: Gained IPv6LL Feb 9 19:18:01.475522 systemd[1]: run-containerd-runc-k8s.io-69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb-runc.Qkc4pq.mount: Deactivated successfully. Feb 9 19:18:01.824577 systemd-networkd[1030]: calicde1cdb5044: Gained IPv6LL Feb 9 19:18:01.909598 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2810181362.mount: Deactivated successfully. Feb 9 19:18:02.331123 env[1156]: time="2024-02-09T19:18:02.331040736Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:02.334826 env[1156]: time="2024-02-09T19:18:02.334764604Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:02.337300 env[1156]: time="2024-02-09T19:18:02.337253237Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:02.339850 env[1156]: time="2024-02-09T19:18:02.339798000Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:02.340775 env[1156]: time="2024-02-09T19:18:02.340723401Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 19:18:02.345102 env[1156]: time="2024-02-09T19:18:02.345058105Z" level=info msg="CreateContainer within sandbox \"69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:18:02.369594 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount578110432.mount: Deactivated successfully. Feb 9 19:18:02.383500 env[1156]: time="2024-02-09T19:18:02.383422753Z" level=info msg="CreateContainer within sandbox \"69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"cd085e1a8bd772fb94d4bb1c703ab853e321973abf9e5b720673c1dca490c6f8\"" Feb 9 19:18:02.386472 env[1156]: time="2024-02-09T19:18:02.384505871Z" level=info msg="StartContainer for \"cd085e1a8bd772fb94d4bb1c703ab853e321973abf9e5b720673c1dca490c6f8\"" Feb 9 19:18:02.415491 systemd[1]: Started cri-containerd-cd085e1a8bd772fb94d4bb1c703ab853e321973abf9e5b720673c1dca490c6f8.scope. Feb 9 19:18:02.441000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.441000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3345 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:02.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303835653161386264373732666239346434626231633730336162 Feb 9 19:18:02.441000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.441000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.441000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.441000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.441000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.441000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.441000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.441000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.441000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.441000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.441000 audit: BPF prog-id=159 op=LOAD Feb 9 19:18:02.441000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024ae0 items=0 ppid=3345 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:02.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303835653161386264373732666239346434626231633730336162 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit: BPF prog-id=160 op=LOAD Feb 9 19:18:02.442000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024b28 items=0 ppid=3345 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:02.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303835653161386264373732666239346434626231633730336162 Feb 9 19:18:02.442000 audit: BPF prog-id=160 op=UNLOAD Feb 9 19:18:02.442000 audit: BPF prog-id=159 op=UNLOAD Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:02.442000 audit: BPF prog-id=161 op=LOAD Feb 9 19:18:02.442000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024bb8 items=0 ppid=3345 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:02.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303835653161386264373732666239346434626231633730336162 Feb 9 19:18:02.468087 env[1156]: time="2024-02-09T19:18:02.468011348Z" level=info msg="StartContainer for \"cd085e1a8bd772fb94d4bb1c703ab853e321973abf9e5b720673c1dca490c6f8\" returns successfully" Feb 9 19:18:02.470859 env[1156]: time="2024-02-09T19:18:02.470739123Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:18:03.872866 env[1156]: time="2024-02-09T19:18:03.872794581Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:03.876052 env[1156]: time="2024-02-09T19:18:03.875994765Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:03.878607 env[1156]: time="2024-02-09T19:18:03.878554822Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:03.881060 env[1156]: time="2024-02-09T19:18:03.881010002Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:03.882129 env[1156]: time="2024-02-09T19:18:03.882081079Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 19:18:03.888109 env[1156]: time="2024-02-09T19:18:03.888048190Z" level=info msg="CreateContainer within sandbox \"69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:18:03.910350 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount840576911.mount: Deactivated successfully. Feb 9 19:18:03.917002 env[1156]: time="2024-02-09T19:18:03.916839740Z" level=info msg="CreateContainer within sandbox \"69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"27265c48b482b6437f8488f5fbfa35ef0ba8564a087ddffb5c0caf0c3567b04e\"" Feb 9 19:18:03.920014 env[1156]: time="2024-02-09T19:18:03.919900045Z" level=info msg="StartContainer for \"27265c48b482b6437f8488f5fbfa35ef0ba8564a087ddffb5c0caf0c3567b04e\"" Feb 9 19:18:03.966095 systemd[1]: run-containerd-runc-k8s.io-27265c48b482b6437f8488f5fbfa35ef0ba8564a087ddffb5c0caf0c3567b04e-runc.QnV6zr.mount: Deactivated successfully. Feb 9 19:18:03.971093 systemd[1]: Started cri-containerd-27265c48b482b6437f8488f5fbfa35ef0ba8564a087ddffb5c0caf0c3567b04e.scope. Feb 9 19:18:04.000000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.028258 kernel: kauditd_printk_skb: 178 callbacks suppressed Feb 9 19:18:04.028452 kernel: audit: type=1400 audit(1707506284.000:1236): avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.000000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3345 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:04.060293 kernel: audit: type=1300 audit(1707506284.000:1236): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3345 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:04.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237323635633438623438326236343337663834383866356662666133 Feb 9 19:18:04.090960 kernel: audit: type=1327 audit(1707506284.000:1236): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237323635633438623438326236343337663834383866356662666133 Feb 9 19:18:04.000000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.112196 kernel: audit: type=1400 audit(1707506284.000:1237): avc: denied { bpf } for pid=3428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.000000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.000000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.153868 kernel: audit: type=1400 audit(1707506284.000:1237): avc: denied { bpf } for pid=3428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.154090 kernel: audit: type=1400 audit(1707506284.000:1237): avc: denied { bpf } for pid=3428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.154145 kernel: audit: type=1400 audit(1707506284.000:1237): avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.000000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.000000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.196023 kernel: audit: type=1400 audit(1707506284.000:1237): avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.196170 kernel: audit: type=1400 audit(1707506284.000:1237): avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.000000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.217077 kernel: audit: type=1400 audit(1707506284.000:1237): avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.000000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.217782 env[1156]: time="2024-02-09T19:18:04.217725036Z" level=info msg="StartContainer for \"27265c48b482b6437f8488f5fbfa35ef0ba8564a087ddffb5c0caf0c3567b04e\" returns successfully" Feb 9 19:18:04.000000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.000000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.000000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.000000 audit: BPF prog-id=162 op=LOAD Feb 9 19:18:04.000000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000f5ea0 items=0 ppid=3345 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:04.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237323635633438623438326236343337663834383866356662666133 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit: BPF prog-id=163 op=LOAD Feb 9 19:18:04.027000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000f5ee8 items=0 ppid=3345 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:04.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237323635633438623438326236343337663834383866356662666133 Feb 9 19:18:04.027000 audit: BPF prog-id=163 op=UNLOAD Feb 9 19:18:04.027000 audit: BPF prog-id=162 op=UNLOAD Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:04.027000 audit: BPF prog-id=164 op=LOAD Feb 9 19:18:04.027000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000f5f78 items=0 ppid=3345 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:04.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237323635633438623438326236343337663834383866356662666133 Feb 9 19:18:04.361047 env[1156]: time="2024-02-09T19:18:04.360991190Z" level=info msg="StopPodSandbox for \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\"" Feb 9 19:18:04.363251 env[1156]: time="2024-02-09T19:18:04.361819872Z" level=info msg="StopPodSandbox for \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\"" Feb 9 19:18:04.363778 env[1156]: time="2024-02-09T19:18:04.361870903Z" level=info msg="StopPodSandbox for \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\"" Feb 9 19:18:04.503684 kubelet[2103]: I0209 19:18:04.503217 2103 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:18:04.503684 kubelet[2103]: I0209 19:18:04.503264 2103 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:18:04.608501 env[1156]: 2024-02-09 19:18:04.539 [INFO][3515] k8s.go 578: Cleaning up netns ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Feb 9 19:18:04.608501 env[1156]: 2024-02-09 19:18:04.540 [INFO][3515] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" iface="eth0" netns="/var/run/netns/cni-8745e30a-71ce-3f98-6176-5a2f5a31317b" Feb 9 19:18:04.608501 env[1156]: 2024-02-09 19:18:04.540 [INFO][3515] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" iface="eth0" netns="/var/run/netns/cni-8745e30a-71ce-3f98-6176-5a2f5a31317b" Feb 9 19:18:04.608501 env[1156]: 2024-02-09 19:18:04.540 [INFO][3515] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" iface="eth0" netns="/var/run/netns/cni-8745e30a-71ce-3f98-6176-5a2f5a31317b" Feb 9 19:18:04.608501 env[1156]: 2024-02-09 19:18:04.540 [INFO][3515] k8s.go 585: Releasing IP address(es) ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Feb 9 19:18:04.608501 env[1156]: 2024-02-09 19:18:04.541 [INFO][3515] utils.go 188: Calico CNI releasing IP address ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Feb 9 19:18:04.608501 env[1156]: 2024-02-09 19:18:04.588 [INFO][3533] ipam_plugin.go 415: Releasing address using handleID ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" HandleID="k8s-pod-network.543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" Feb 9 19:18:04.608501 env[1156]: 2024-02-09 19:18:04.588 [INFO][3533] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:04.608501 env[1156]: 2024-02-09 19:18:04.588 [INFO][3533] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:04.608501 env[1156]: 2024-02-09 19:18:04.598 [WARNING][3533] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" HandleID="k8s-pod-network.543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" Feb 9 19:18:04.608501 env[1156]: 2024-02-09 19:18:04.598 [INFO][3533] ipam_plugin.go 443: Releasing address using workloadID ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" HandleID="k8s-pod-network.543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" Feb 9 19:18:04.608501 env[1156]: 2024-02-09 19:18:04.601 [INFO][3533] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:04.608501 env[1156]: 2024-02-09 19:18:04.607 [INFO][3515] k8s.go 591: Teardown processing complete. ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Feb 9 19:18:04.609538 env[1156]: time="2024-02-09T19:18:04.608806462Z" level=info msg="TearDown network for sandbox \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\" successfully" Feb 9 19:18:04.609538 env[1156]: time="2024-02-09T19:18:04.608869292Z" level=info msg="StopPodSandbox for \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\" returns successfully" Feb 9 19:18:04.610247 env[1156]: time="2024-02-09T19:18:04.610191481Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-54658fdfbb-crt8d,Uid:8feb3f03-a392-4e58-84f6-be28625a1815,Namespace:calico-system,Attempt:1,}" Feb 9 19:18:04.626824 env[1156]: 2024-02-09 19:18:04.472 [INFO][3506] k8s.go 578: Cleaning up netns ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Feb 9 19:18:04.626824 env[1156]: 2024-02-09 19:18:04.472 [INFO][3506] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" iface="eth0" netns="/var/run/netns/cni-5174d542-e2cd-f2fa-b162-536620f52877" Feb 9 19:18:04.626824 env[1156]: 2024-02-09 19:18:04.473 [INFO][3506] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" iface="eth0" netns="/var/run/netns/cni-5174d542-e2cd-f2fa-b162-536620f52877" Feb 9 19:18:04.626824 env[1156]: 2024-02-09 19:18:04.473 [INFO][3506] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" iface="eth0" netns="/var/run/netns/cni-5174d542-e2cd-f2fa-b162-536620f52877" Feb 9 19:18:04.626824 env[1156]: 2024-02-09 19:18:04.473 [INFO][3506] k8s.go 585: Releasing IP address(es) ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Feb 9 19:18:04.626824 env[1156]: 2024-02-09 19:18:04.473 [INFO][3506] utils.go 188: Calico CNI releasing IP address ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Feb 9 19:18:04.626824 env[1156]: 2024-02-09 19:18:04.590 [INFO][3521] ipam_plugin.go 415: Releasing address using handleID ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" HandleID="k8s-pod-network.2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" Feb 9 19:18:04.626824 env[1156]: 2024-02-09 19:18:04.590 [INFO][3521] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:04.626824 env[1156]: 2024-02-09 19:18:04.600 [INFO][3521] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:04.626824 env[1156]: 2024-02-09 19:18:04.615 [WARNING][3521] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" HandleID="k8s-pod-network.2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" Feb 9 19:18:04.626824 env[1156]: 2024-02-09 19:18:04.615 [INFO][3521] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" HandleID="k8s-pod-network.2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" Feb 9 19:18:04.626824 env[1156]: 2024-02-09 19:18:04.618 [INFO][3521] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:04.626824 env[1156]: 2024-02-09 19:18:04.625 [INFO][3506] k8s.go 591: Teardown processing complete. ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Feb 9 19:18:04.628693 env[1156]: time="2024-02-09T19:18:04.628629108Z" level=info msg="TearDown network for sandbox \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\" successfully" Feb 9 19:18:04.628885 env[1156]: time="2024-02-09T19:18:04.628841005Z" level=info msg="StopPodSandbox for \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\" returns successfully" Feb 9 19:18:04.630215 env[1156]: time="2024-02-09T19:18:04.630172228Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-djfsf,Uid:cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf,Namespace:kube-system,Attempt:1,}" Feb 9 19:18:04.641998 env[1156]: 2024-02-09 19:18:04.490 [INFO][3487] k8s.go 578: Cleaning up netns ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Feb 9 19:18:04.641998 env[1156]: 2024-02-09 19:18:04.490 [INFO][3487] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" iface="eth0" netns="/var/run/netns/cni-49d665ee-5be3-fb80-47ef-5163ed89d5d1" Feb 9 19:18:04.641998 env[1156]: 2024-02-09 19:18:04.491 [INFO][3487] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" iface="eth0" netns="/var/run/netns/cni-49d665ee-5be3-fb80-47ef-5163ed89d5d1" Feb 9 19:18:04.641998 env[1156]: 2024-02-09 19:18:04.491 [INFO][3487] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" iface="eth0" netns="/var/run/netns/cni-49d665ee-5be3-fb80-47ef-5163ed89d5d1" Feb 9 19:18:04.641998 env[1156]: 2024-02-09 19:18:04.491 [INFO][3487] k8s.go 585: Releasing IP address(es) ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Feb 9 19:18:04.641998 env[1156]: 2024-02-09 19:18:04.491 [INFO][3487] utils.go 188: Calico CNI releasing IP address ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Feb 9 19:18:04.641998 env[1156]: 2024-02-09 19:18:04.595 [INFO][3526] ipam_plugin.go 415: Releasing address using handleID ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" HandleID="k8s-pod-network.d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" Feb 9 19:18:04.641998 env[1156]: 2024-02-09 19:18:04.596 [INFO][3526] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:04.641998 env[1156]: 2024-02-09 19:18:04.618 [INFO][3526] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:04.641998 env[1156]: 2024-02-09 19:18:04.631 [WARNING][3526] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" HandleID="k8s-pod-network.d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" Feb 9 19:18:04.641998 env[1156]: 2024-02-09 19:18:04.633 [INFO][3526] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" HandleID="k8s-pod-network.d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" Feb 9 19:18:04.641998 env[1156]: 2024-02-09 19:18:04.636 [INFO][3526] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:04.641998 env[1156]: 2024-02-09 19:18:04.638 [INFO][3487] k8s.go 591: Teardown processing complete. ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Feb 9 19:18:04.641998 env[1156]: time="2024-02-09T19:18:04.640807675Z" level=info msg="TearDown network for sandbox \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\" successfully" Feb 9 19:18:04.641998 env[1156]: time="2024-02-09T19:18:04.640843987Z" level=info msg="StopPodSandbox for \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\" returns successfully" Feb 9 19:18:04.645820 env[1156]: time="2024-02-09T19:18:04.645756642Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-vb9zx,Uid:63ac1e07-6f01-4725-930f-57f59f86c2e5,Namespace:kube-system,Attempt:1,}" Feb 9 19:18:04.891775 systemd-networkd[1030]: calib0b4c6ef6e3: Link UP Feb 9 19:18:04.911395 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:18:04.916802 systemd[1]: run-netns-cni\x2d5174d542\x2de2cd\x2df2fa\x2db162\x2d536620f52877.mount: Deactivated successfully. Feb 9 19:18:04.917162 systemd[1]: run-netns-cni\x2d49d665ee\x2d5be3\x2dfb80\x2d47ef\x2d5163ed89d5d1.mount: Deactivated successfully. Feb 9 19:18:04.917404 systemd[1]: run-netns-cni\x2d8745e30a\x2d71ce\x2d3f98\x2d6176\x2d5a2f5a31317b.mount: Deactivated successfully. Feb 9 19:18:04.920067 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib0b4c6ef6e3: link becomes ready Feb 9 19:18:04.928704 systemd-networkd[1030]: calib0b4c6ef6e3: Gained carrier Feb 9 19:18:04.948079 kubelet[2103]: I0209 19:18:04.947301 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-257w5" podStartSLOduration=26.865548607 podCreationTimestamp="2024-02-09 19:17:35 +0000 UTC" firstStartedPulling="2024-02-09 19:18:00.800805465 +0000 UTC m=+44.707783295" lastFinishedPulling="2024-02-09 19:18:03.882468769 +0000 UTC m=+47.789446600" observedRunningTime="2024-02-09 19:18:04.692620057 +0000 UTC m=+48.599597896" watchObservedRunningTime="2024-02-09 19:18:04.947211912 +0000 UTC m=+48.854189751" Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.745 [INFO][3545] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0 calico-kube-controllers-54658fdfbb- calico-system 8feb3f03-a392-4e58-84f6-be28625a1815 739 0 2024-02-09 19:17:35 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:54658fdfbb projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal calico-kube-controllers-54658fdfbb-crt8d eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calib0b4c6ef6e3 [] []}} ContainerID="e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" Namespace="calico-system" Pod="calico-kube-controllers-54658fdfbb-crt8d" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-" Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.746 [INFO][3545] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" Namespace="calico-system" Pod="calico-kube-controllers-54658fdfbb-crt8d" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.822 [INFO][3578] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" HandleID="k8s-pod-network.e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.838 [INFO][3578] ipam_plugin.go 268: Auto assigning IP ContainerID="e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" HandleID="k8s-pod-network.e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002befe0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", "pod":"calico-kube-controllers-54658fdfbb-crt8d", "timestamp":"2024-02-09 19:18:04.822884248 +0000 UTC"}, Hostname:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.839 [INFO][3578] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.839 [INFO][3578] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.840 [INFO][3578] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal' Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.842 [INFO][3578] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.848 [INFO][3578] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.853 [INFO][3578] ipam.go 489: Trying affinity for 192.168.21.128/26 host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.856 [INFO][3578] ipam.go 155: Attempting to load block cidr=192.168.21.128/26 host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.860 [INFO][3578] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.128/26 host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.860 [INFO][3578] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.128/26 handle="k8s-pod-network.e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.862 [INFO][3578] ipam.go 1682: Creating new handle: k8s-pod-network.e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614 Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.873 [INFO][3578] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.128/26 handle="k8s-pod-network.e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.885 [INFO][3578] ipam.go 1216: Successfully claimed IPs: [192.168.21.130/26] block=192.168.21.128/26 handle="k8s-pod-network.e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.885 [INFO][3578] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.130/26] handle="k8s-pod-network.e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.885 [INFO][3578] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:04.951132 env[1156]: 2024-02-09 19:18:04.885 [INFO][3578] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.130/26] IPv6=[] ContainerID="e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" HandleID="k8s-pod-network.e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" Feb 9 19:18:04.953725 env[1156]: 2024-02-09 19:18:04.887 [INFO][3545] k8s.go 385: Populated endpoint ContainerID="e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" Namespace="calico-system" Pod="calico-kube-controllers-54658fdfbb-crt8d" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0", GenerateName:"calico-kube-controllers-54658fdfbb-", Namespace:"calico-system", SelfLink:"", UID:"8feb3f03-a392-4e58-84f6-be28625a1815", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"54658fdfbb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-54658fdfbb-crt8d", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib0b4c6ef6e3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:04.953725 env[1156]: 2024-02-09 19:18:04.887 [INFO][3545] k8s.go 386: Calico CNI using IPs: [192.168.21.130/32] ContainerID="e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" Namespace="calico-system" Pod="calico-kube-controllers-54658fdfbb-crt8d" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" Feb 9 19:18:04.953725 env[1156]: 2024-02-09 19:18:04.887 [INFO][3545] dataplane_linux.go 68: Setting the host side veth name to calib0b4c6ef6e3 ContainerID="e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" Namespace="calico-system" Pod="calico-kube-controllers-54658fdfbb-crt8d" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" Feb 9 19:18:04.953725 env[1156]: 2024-02-09 19:18:04.927 [INFO][3545] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" Namespace="calico-system" Pod="calico-kube-controllers-54658fdfbb-crt8d" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" Feb 9 19:18:04.953725 env[1156]: 2024-02-09 19:18:04.931 [INFO][3545] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" Namespace="calico-system" Pod="calico-kube-controllers-54658fdfbb-crt8d" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0", GenerateName:"calico-kube-controllers-54658fdfbb-", Namespace:"calico-system", SelfLink:"", UID:"8feb3f03-a392-4e58-84f6-be28625a1815", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"54658fdfbb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614", Pod:"calico-kube-controllers-54658fdfbb-crt8d", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib0b4c6ef6e3", MAC:"ba:d1:b4:fa:31:ab", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:04.953725 env[1156]: 2024-02-09 19:18:04.945 [INFO][3545] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614" Namespace="calico-system" Pod="calico-kube-controllers-54658fdfbb-crt8d" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" Feb 9 19:18:04.999000 audit[3614]: NETFILTER_CFG table=filter:102 family=2 entries=34 op=nft_register_chain pid=3614 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:18:04.999000 audit[3614]: SYSCALL arch=c000003e syscall=46 success=yes exit=18320 a0=3 a1=7fffe8e448c0 a2=0 a3=7fffe8e448ac items=0 ppid=3102 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:04.999000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:18:05.038005 env[1156]: time="2024-02-09T19:18:05.037873304Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:18:05.038372 env[1156]: time="2024-02-09T19:18:05.038317128Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:18:05.038619 env[1156]: time="2024-02-09T19:18:05.038545890Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:18:05.039212 env[1156]: time="2024-02-09T19:18:05.039157712Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614 pid=3624 runtime=io.containerd.runc.v2 Feb 9 19:18:05.078730 systemd[1]: Started cri-containerd-e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614.scope. Feb 9 19:18:05.094200 systemd[1]: run-containerd-runc-k8s.io-e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614-runc.pjLvpi.mount: Deactivated successfully. Feb 9 19:18:05.123532 systemd-networkd[1030]: calief6fb63b2b8: Link UP Feb 9 19:18:05.129969 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calief6fb63b2b8: link becomes ready Feb 9 19:18:05.130396 systemd-networkd[1030]: calief6fb63b2b8: Gained carrier Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:04.811 [INFO][3553] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0 coredns-5d78c9869d- kube-system cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf 735 0 2024-02-09 19:17:30 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal coredns-5d78c9869d-djfsf eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calief6fb63b2b8 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" Namespace="kube-system" Pod="coredns-5d78c9869d-djfsf" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-" Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:04.814 [INFO][3553] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" Namespace="kube-system" Pod="coredns-5d78c9869d-djfsf" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:05.004 [INFO][3589] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" HandleID="k8s-pod-network.f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:05.033 [INFO][3589] ipam_plugin.go 268: Auto assigning IP ContainerID="f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" HandleID="k8s-pod-network.f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027cc10), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", "pod":"coredns-5d78c9869d-djfsf", "timestamp":"2024-02-09 19:18:05.004257127 +0000 UTC"}, Hostname:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:05.033 [INFO][3589] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:05.033 [INFO][3589] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:05.033 [INFO][3589] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal' Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:05.036 [INFO][3589] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:05.050 [INFO][3589] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:05.057 [INFO][3589] ipam.go 489: Trying affinity for 192.168.21.128/26 host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:05.063 [INFO][3589] ipam.go 155: Attempting to load block cidr=192.168.21.128/26 host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:05.068 [INFO][3589] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.128/26 host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:05.068 [INFO][3589] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.128/26 handle="k8s-pod-network.f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:05.071 [INFO][3589] ipam.go 1682: Creating new handle: k8s-pod-network.f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:05.079 [INFO][3589] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.128/26 handle="k8s-pod-network.f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:05.107 [INFO][3589] ipam.go 1216: Successfully claimed IPs: [192.168.21.131/26] block=192.168.21.128/26 handle="k8s-pod-network.f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:05.107 [INFO][3589] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.131/26] handle="k8s-pod-network.f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:05.107 [INFO][3589] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:05.160600 env[1156]: 2024-02-09 19:18:05.107 [INFO][3589] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.131/26] IPv6=[] ContainerID="f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" HandleID="k8s-pod-network.f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" Feb 9 19:18:05.162667 env[1156]: 2024-02-09 19:18:05.109 [INFO][3553] k8s.go 385: Populated endpoint ContainerID="f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" Namespace="kube-system" Pod="coredns-5d78c9869d-djfsf" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf", ResourceVersion:"735", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-5d78c9869d-djfsf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calief6fb63b2b8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:05.162667 env[1156]: 2024-02-09 19:18:05.109 [INFO][3553] k8s.go 386: Calico CNI using IPs: [192.168.21.131/32] ContainerID="f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" Namespace="kube-system" Pod="coredns-5d78c9869d-djfsf" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" Feb 9 19:18:05.162667 env[1156]: 2024-02-09 19:18:05.109 [INFO][3553] dataplane_linux.go 68: Setting the host side veth name to calief6fb63b2b8 ContainerID="f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" Namespace="kube-system" Pod="coredns-5d78c9869d-djfsf" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" Feb 9 19:18:05.162667 env[1156]: 2024-02-09 19:18:05.134 [INFO][3553] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" Namespace="kube-system" Pod="coredns-5d78c9869d-djfsf" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" Feb 9 19:18:05.162667 env[1156]: 2024-02-09 19:18:05.134 [INFO][3553] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" Namespace="kube-system" Pod="coredns-5d78c9869d-djfsf" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf", ResourceVersion:"735", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a", Pod:"coredns-5d78c9869d-djfsf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calief6fb63b2b8", MAC:"52:49:5e:95:4b:af", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:05.162667 env[1156]: 2024-02-09 19:18:05.158 [INFO][3553] k8s.go 491: Wrote updated endpoint to datastore ContainerID="f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a" Namespace="kube-system" Pod="coredns-5d78c9869d-djfsf" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" Feb 9 19:18:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.181000 audit: BPF prog-id=165 op=LOAD Feb 9 19:18:05.187000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.187000 audit[3636]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3624 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530613537616637396639333439386536616339323538313130643636 Feb 9 19:18:05.187000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.187000 audit[3636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3624 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530613537616637396639333439386536616339323538313130643636 Feb 9 19:18:05.187000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.187000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.187000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.187000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.187000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.187000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.187000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.187000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.187000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.187000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.187000 audit: BPF prog-id=166 op=LOAD Feb 9 19:18:05.187000 audit[3636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ec7e0 items=0 ppid=3624 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530613537616637396639333439386536616339323538313130643636 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit: BPF prog-id=167 op=LOAD Feb 9 19:18:05.188000 audit[3636]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003ec828 items=0 ppid=3624 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530613537616637396639333439386536616339323538313130643636 Feb 9 19:18:05.188000 audit: BPF prog-id=167 op=UNLOAD Feb 9 19:18:05.188000 audit: BPF prog-id=166 op=UNLOAD Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.188000 audit: BPF prog-id=168 op=LOAD Feb 9 19:18:05.188000 audit[3636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003ecc38 items=0 ppid=3624 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530613537616637396639333439386536616339323538313130643636 Feb 9 19:18:05.198314 systemd-networkd[1030]: cali6253f898301: Link UP Feb 9 19:18:05.207563 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6253f898301: link becomes ready Feb 9 19:18:05.208235 systemd-networkd[1030]: cali6253f898301: Gained carrier Feb 9 19:18:05.210728 env[1156]: time="2024-02-09T19:18:05.210599525Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:18:05.210728 env[1156]: time="2024-02-09T19:18:05.210705544Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:18:05.211217 env[1156]: time="2024-02-09T19:18:05.210750418Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:18:05.211217 env[1156]: time="2024-02-09T19:18:05.211021018Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a pid=3673 runtime=io.containerd.runc.v2 Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:04.817 [INFO][3564] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0 coredns-5d78c9869d- kube-system 63ac1e07-6f01-4725-930f-57f59f86c2e5 737 0 2024-02-09 19:17:30 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal coredns-5d78c9869d-vb9zx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6253f898301 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" Namespace="kube-system" Pod="coredns-5d78c9869d-vb9zx" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-" Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:04.817 [INFO][3564] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" Namespace="kube-system" Pod="coredns-5d78c9869d-vb9zx" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:05.010 [INFO][3588] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" HandleID="k8s-pod-network.25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:05.038 [INFO][3588] ipam_plugin.go 268: Auto assigning IP ContainerID="25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" HandleID="k8s-pod-network.25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027cfa0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", "pod":"coredns-5d78c9869d-vb9zx", "timestamp":"2024-02-09 19:18:05.01077049 +0000 UTC"}, Hostname:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:05.038 [INFO][3588] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:05.107 [INFO][3588] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:05.107 [INFO][3588] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal' Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:05.111 [INFO][3588] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:05.133 [INFO][3588] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:05.147 [INFO][3588] ipam.go 489: Trying affinity for 192.168.21.128/26 host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:05.151 [INFO][3588] ipam.go 155: Attempting to load block cidr=192.168.21.128/26 host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:05.154 [INFO][3588] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.128/26 host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:05.155 [INFO][3588] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.128/26 handle="k8s-pod-network.25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:05.157 [INFO][3588] ipam.go 1682: Creating new handle: k8s-pod-network.25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3 Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:05.172 [INFO][3588] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.128/26 handle="k8s-pod-network.25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:05.187 [INFO][3588] ipam.go 1216: Successfully claimed IPs: [192.168.21.132/26] block=192.168.21.128/26 handle="k8s-pod-network.25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:05.187 [INFO][3588] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.132/26] handle="k8s-pod-network.25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:05.188 [INFO][3588] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:05.254975 env[1156]: 2024-02-09 19:18:05.188 [INFO][3588] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.132/26] IPv6=[] ContainerID="25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" HandleID="k8s-pod-network.25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" Feb 9 19:18:05.256231 env[1156]: 2024-02-09 19:18:05.194 [INFO][3564] k8s.go 385: Populated endpoint ContainerID="25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" Namespace="kube-system" Pod="coredns-5d78c9869d-vb9zx" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"63ac1e07-6f01-4725-930f-57f59f86c2e5", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-5d78c9869d-vb9zx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6253f898301", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:05.256231 env[1156]: 2024-02-09 19:18:05.195 [INFO][3564] k8s.go 386: Calico CNI using IPs: [192.168.21.132/32] ContainerID="25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" Namespace="kube-system" Pod="coredns-5d78c9869d-vb9zx" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" Feb 9 19:18:05.256231 env[1156]: 2024-02-09 19:18:05.195 [INFO][3564] dataplane_linux.go 68: Setting the host side veth name to cali6253f898301 ContainerID="25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" Namespace="kube-system" Pod="coredns-5d78c9869d-vb9zx" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" Feb 9 19:18:05.256231 env[1156]: 2024-02-09 19:18:05.210 [INFO][3564] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" Namespace="kube-system" Pod="coredns-5d78c9869d-vb9zx" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" Feb 9 19:18:05.256231 env[1156]: 2024-02-09 19:18:05.211 [INFO][3564] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" Namespace="kube-system" Pod="coredns-5d78c9869d-vb9zx" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"63ac1e07-6f01-4725-930f-57f59f86c2e5", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3", Pod:"coredns-5d78c9869d-vb9zx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6253f898301", MAC:"be:be:cc:7d:99:55", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:05.256231 env[1156]: 2024-02-09 19:18:05.239 [INFO][3564] k8s.go 491: Wrote updated endpoint to datastore ContainerID="25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3" Namespace="kube-system" Pod="coredns-5d78c9869d-vb9zx" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" Feb 9 19:18:05.265677 systemd[1]: Started cri-containerd-f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a.scope. Feb 9 19:18:05.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.293000 audit: BPF prog-id=169 op=LOAD Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3673 pid=3685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630393232363433383763353264303166646666613462373034353835 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3673 pid=3685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630393232363433383763353264303166646666613462373034353835 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit: BPF prog-id=170 op=LOAD Feb 9 19:18:05.295000 audit[3685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d86b0 items=0 ppid=3673 pid=3685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630393232363433383763353264303166646666613462373034353835 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit: BPF prog-id=171 op=LOAD Feb 9 19:18:05.295000 audit[3685]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d86f8 items=0 ppid=3673 pid=3685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630393232363433383763353264303166646666613462373034353835 Feb 9 19:18:05.295000 audit: BPF prog-id=171 op=UNLOAD Feb 9 19:18:05.295000 audit: BPF prog-id=170 op=UNLOAD Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.295000 audit: BPF prog-id=172 op=LOAD Feb 9 19:18:05.295000 audit[3685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d8b08 items=0 ppid=3673 pid=3685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630393232363433383763353264303166646666613462373034353835 Feb 9 19:18:05.303275 env[1156]: time="2024-02-09T19:18:05.303175595Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:18:05.303275 env[1156]: time="2024-02-09T19:18:05.303240890Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:18:05.303650 env[1156]: time="2024-02-09T19:18:05.303261019Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:18:05.304004 env[1156]: time="2024-02-09T19:18:05.303920474Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3 pid=3722 runtime=io.containerd.runc.v2 Feb 9 19:18:05.335564 systemd[1]: Started cri-containerd-25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3.scope. Feb 9 19:18:05.373156 env[1156]: time="2024-02-09T19:18:05.373097058Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-djfsf,Uid:cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf,Namespace:kube-system,Attempt:1,} returns sandbox id \"f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a\"" Feb 9 19:18:05.378485 env[1156]: time="2024-02-09T19:18:05.378437092Z" level=info msg="CreateContainer within sandbox \"f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:18:05.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.385000 audit: BPF prog-id=173 op=LOAD Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3722 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235646630626639396563303630313137643162663762653362623162 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3722 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235646630626639396563303630313137643162663762653362623162 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit: BPF prog-id=174 op=LOAD Feb 9 19:18:05.386000 audit[3734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000216340 items=0 ppid=3722 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235646630626639396563303630313137643162663762653362623162 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.386000 audit: BPF prog-id=175 op=LOAD Feb 9 19:18:05.386000 audit[3734]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000216388 items=0 ppid=3722 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235646630626639396563303630313137643162663762653362623162 Feb 9 19:18:05.387000 audit: BPF prog-id=175 op=UNLOAD Feb 9 19:18:05.387000 audit: BPF prog-id=174 op=UNLOAD Feb 9 19:18:05.387000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.387000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.387000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.387000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.387000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.387000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.387000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.387000 audit[3734]: AVC avc: denied { perfmon } for pid=3734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.387000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.387000 audit[3734]: AVC avc: denied { bpf } for pid=3734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.387000 audit: BPF prog-id=176 op=LOAD Feb 9 19:18:05.387000 audit[3734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000216798 items=0 ppid=3722 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235646630626639396563303630313137643162663762653362623162 Feb 9 19:18:05.407960 env[1156]: time="2024-02-09T19:18:05.407794768Z" level=info msg="CreateContainer within sandbox \"f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c54f29e19d5d4aa5123eaaeb15de3e433a690e692b3a3dac6ad24b933d74d9fb\"" Feb 9 19:18:05.409257 env[1156]: time="2024-02-09T19:18:05.409220994Z" level=info msg="StartContainer for \"c54f29e19d5d4aa5123eaaeb15de3e433a690e692b3a3dac6ad24b933d74d9fb\"" Feb 9 19:18:05.427000 audit[3758]: NETFILTER_CFG table=filter:103 family=2 entries=44 op=nft_register_chain pid=3758 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:18:05.427000 audit[3758]: SYSCALL arch=c000003e syscall=46 success=yes exit=22284 a0=3 a1=7ffc019ce310 a2=0 a3=7ffc019ce2fc items=0 ppid=3102 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.427000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:18:05.456901 env[1156]: time="2024-02-09T19:18:05.456822063Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-54658fdfbb-crt8d,Uid:8feb3f03-a392-4e58-84f6-be28625a1815,Namespace:calico-system,Attempt:1,} returns sandbox id \"e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614\"" Feb 9 19:18:05.462698 env[1156]: time="2024-02-09T19:18:05.462655764Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 19:18:05.477018 env[1156]: time="2024-02-09T19:18:05.476953705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-vb9zx,Uid:63ac1e07-6f01-4725-930f-57f59f86c2e5,Namespace:kube-system,Attempt:1,} returns sandbox id \"25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3\"" Feb 9 19:18:05.485108 env[1156]: time="2024-02-09T19:18:05.485058687Z" level=info msg="CreateContainer within sandbox \"25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:18:05.496201 systemd[1]: Started cri-containerd-c54f29e19d5d4aa5123eaaeb15de3e433a690e692b3a3dac6ad24b933d74d9fb.scope. Feb 9 19:18:05.500000 audit[3789]: NETFILTER_CFG table=filter:104 family=2 entries=38 op=nft_register_chain pid=3789 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:18:05.500000 audit[3789]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffdae8ed660 a2=0 a3=7ffdae8ed64c items=0 ppid=3102 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.500000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:18:05.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.526000 audit: BPF prog-id=177 op=LOAD Feb 9 19:18:05.528501 env[1156]: time="2024-02-09T19:18:05.528414532Z" level=info msg="CreateContainer within sandbox \"25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"dfd00f9fe294e1d6e512f78551890dcf29bcb4515e2d37f35e501ef0cefa1183\"" Feb 9 19:18:05.529371 env[1156]: time="2024-02-09T19:18:05.529312966Z" level=info msg="StartContainer for \"dfd00f9fe294e1d6e512f78551890dcf29bcb4515e2d37f35e501ef0cefa1183\"" Feb 9 19:18:05.528000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.528000 audit[3774]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3673 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335346632396531396435643461613531323365616165623135646533 Feb 9 19:18:05.531000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.531000 audit[3774]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3673 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335346632396531396435643461613531323365616165623135646533 Feb 9 19:18:05.531000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.531000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.531000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.531000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.531000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.531000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.531000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.531000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.531000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.531000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.531000 audit: BPF prog-id=178 op=LOAD Feb 9 19:18:05.531000 audit[3774]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003249f0 items=0 ppid=3673 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335346632396531396435643461613531323365616165623135646533 Feb 9 19:18:05.532000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.532000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.532000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.532000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.532000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.532000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.532000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.532000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.532000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.532000 audit: BPF prog-id=179 op=LOAD Feb 9 19:18:05.532000 audit[3774]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000324a38 items=0 ppid=3673 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335346632396531396435643461613531323365616165623135646533 Feb 9 19:18:05.533000 audit: BPF prog-id=179 op=UNLOAD Feb 9 19:18:05.533000 audit: BPF prog-id=178 op=UNLOAD Feb 9 19:18:05.533000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.533000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.533000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.533000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.533000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.533000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.533000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.533000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.533000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.533000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.533000 audit: BPF prog-id=180 op=LOAD Feb 9 19:18:05.533000 audit[3774]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000324e48 items=0 ppid=3673 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335346632396531396435643461613531323365616165623135646533 Feb 9 19:18:05.572815 env[1156]: time="2024-02-09T19:18:05.572742187Z" level=info msg="StartContainer for \"c54f29e19d5d4aa5123eaaeb15de3e433a690e692b3a3dac6ad24b933d74d9fb\" returns successfully" Feb 9 19:18:05.589653 systemd[1]: Started cri-containerd-dfd00f9fe294e1d6e512f78551890dcf29bcb4515e2d37f35e501ef0cefa1183.scope. Feb 9 19:18:05.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.617000 audit: BPF prog-id=181 op=LOAD Feb 9 19:18:05.618000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.618000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3722 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466643030663966653239346531643665353132663738353531383930 Feb 9 19:18:05.618000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.618000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3722 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466643030663966653239346531643665353132663738353531383930 Feb 9 19:18:05.618000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.618000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.618000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.618000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.618000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.618000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.618000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.618000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.618000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.618000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.618000 audit: BPF prog-id=182 op=LOAD Feb 9 19:18:05.618000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00039ebb0 items=0 ppid=3722 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466643030663966653239346531643665353132663738353531383930 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit: BPF prog-id=183 op=LOAD Feb 9 19:18:05.619000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00039ebf8 items=0 ppid=3722 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466643030663966653239346531643665353132663738353531383930 Feb 9 19:18:05.619000 audit: BPF prog-id=183 op=UNLOAD Feb 9 19:18:05.619000 audit: BPF prog-id=182 op=UNLOAD Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { perfmon } for pid=3807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit[3807]: AVC avc: denied { bpf } for pid=3807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:05.619000 audit: BPF prog-id=184 op=LOAD Feb 9 19:18:05.619000 audit[3807]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039f008 items=0 ppid=3722 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466643030663966653239346531643665353132663738353531383930 Feb 9 19:18:05.651261 env[1156]: time="2024-02-09T19:18:05.651189518Z" level=info msg="StartContainer for \"dfd00f9fe294e1d6e512f78551890dcf29bcb4515e2d37f35e501ef0cefa1183\" returns successfully" Feb 9 19:18:05.719061 kubelet[2103]: I0209 19:18:05.718900 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-djfsf" podStartSLOduration=35.718847528 podCreationTimestamp="2024-02-09 19:17:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:18:05.703247106 +0000 UTC m=+49.610224944" watchObservedRunningTime="2024-02-09 19:18:05.718847528 +0000 UTC m=+49.625825366" Feb 9 19:18:05.720470 kubelet[2103]: I0209 19:18:05.720332 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-vb9zx" podStartSLOduration=35.720289408 podCreationTimestamp="2024-02-09 19:17:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:18:05.717098983 +0000 UTC m=+49.624076829" watchObservedRunningTime="2024-02-09 19:18:05.720289408 +0000 UTC m=+49.627267245" Feb 9 19:18:05.740000 audit[3853]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:05.740000 audit[3853]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd6ef1fdb0 a2=0 a3=7ffd6ef1fd9c items=0 ppid=2242 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:05.741000 audit[3853]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=3853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:05.741000 audit[3853]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffd6ef1fdb0 a2=0 a3=31030 items=0 ppid=2242 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.741000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:05.887000 audit[3855]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=3855 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:05.887000 audit[3855]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc35e59f30 a2=0 a3=7ffc35e59f1c items=0 ppid=2242 pid=3855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.887000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:05.889000 audit[3855]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=3855 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:05.889000 audit[3855]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffc35e59f30 a2=0 a3=31030 items=0 ppid=2242 pid=3855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:05.889000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:05.984609 systemd-networkd[1030]: calib0b4c6ef6e3: Gained IPv6LL Feb 9 19:18:06.240206 systemd-networkd[1030]: calief6fb63b2b8: Gained IPv6LL Feb 9 19:18:06.560269 systemd-networkd[1030]: cali6253f898301: Gained IPv6LL Feb 9 19:18:06.841000 audit[3859]: NETFILTER_CFG table=filter:109 family=2 entries=11 op=nft_register_rule pid=3859 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:06.841000 audit[3859]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe4d548e70 a2=0 a3=7ffe4d548e5c items=0 ppid=2242 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:06.841000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:06.848000 audit[3859]: NETFILTER_CFG table=nat:110 family=2 entries=35 op=nft_register_chain pid=3859 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:06.848000 audit[3859]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffe4d548e70 a2=0 a3=7ffe4d548e5c items=0 ppid=2242 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:06.848000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:07.985000 audit[3862]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=3862 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:07.985000 audit[3862]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff2cad74c0 a2=0 a3=7fff2cad74ac items=0 ppid=2242 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:07.985000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:08.005000 audit[3862]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=3862 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:08.005000 audit[3862]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7fff2cad74c0 a2=0 a3=7fff2cad74ac items=0 ppid=2242 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:08.005000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:08.741943 env[1156]: time="2024-02-09T19:18:08.741867643Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:08.744822 env[1156]: time="2024-02-09T19:18:08.744773199Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:08.747448 env[1156]: time="2024-02-09T19:18:08.747409620Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:08.749830 env[1156]: time="2024-02-09T19:18:08.749793780Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:08.751251 env[1156]: time="2024-02-09T19:18:08.751211125Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 9 19:18:08.781316 env[1156]: time="2024-02-09T19:18:08.777684204Z" level=info msg="CreateContainer within sandbox \"e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 19:18:08.805412 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount705341671.mount: Deactivated successfully. Feb 9 19:18:08.823475 env[1156]: time="2024-02-09T19:18:08.823406851Z" level=info msg="CreateContainer within sandbox \"e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"23d83520fc51c052f40ed4b42bbf5503e00251786ddbe5b7882056245b992956\"" Feb 9 19:18:08.827716 env[1156]: time="2024-02-09T19:18:08.827676426Z" level=info msg="StartContainer for \"23d83520fc51c052f40ed4b42bbf5503e00251786ddbe5b7882056245b992956\"" Feb 9 19:18:08.871706 systemd[1]: Started cri-containerd-23d83520fc51c052f40ed4b42bbf5503e00251786ddbe5b7882056245b992956.scope. Feb 9 19:18:08.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.908000 audit: BPF prog-id=185 op=LOAD Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3624 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:08.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643833353230666335316330353266343065643462343262626635 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3624 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:08.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643833353230666335316330353266343065643462343262626635 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit: BPF prog-id=186 op=LOAD Feb 9 19:18:08.909000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002e40a0 items=0 ppid=3624 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:08.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643833353230666335316330353266343065643462343262626635 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit: BPF prog-id=187 op=LOAD Feb 9 19:18:08.909000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002e40e8 items=0 ppid=3624 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:08.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643833353230666335316330353266343065643462343262626635 Feb 9 19:18:08.909000 audit: BPF prog-id=187 op=UNLOAD Feb 9 19:18:08.909000 audit: BPF prog-id=186 op=UNLOAD Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:08.909000 audit: BPF prog-id=188 op=LOAD Feb 9 19:18:08.909000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002e44f8 items=0 ppid=3624 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:08.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643833353230666335316330353266343065643462343262626635 Feb 9 19:18:08.970345 env[1156]: time="2024-02-09T19:18:08.970288523Z" level=info msg="StartContainer for \"23d83520fc51c052f40ed4b42bbf5503e00251786ddbe5b7882056245b992956\" returns successfully" Feb 9 19:18:09.719918 kubelet[2103]: I0209 19:18:09.716567 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-54658fdfbb-crt8d" podStartSLOduration=31.424283368 podCreationTimestamp="2024-02-09 19:17:35 +0000 UTC" firstStartedPulling="2024-02-09 19:18:05.459351064 +0000 UTC m=+49.366328893" lastFinishedPulling="2024-02-09 19:18:08.751567296 +0000 UTC m=+52.658545123" observedRunningTime="2024-02-09 19:18:09.714497026 +0000 UTC m=+53.621474865" watchObservedRunningTime="2024-02-09 19:18:09.716499598 +0000 UTC m=+53.623477436" Feb 9 19:18:11.576000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:11.582811 kernel: kauditd_printk_skb: 408 callbacks suppressed Feb 9 19:18:11.582989 kernel: audit: type=1400 audit(1707506291.576:1361): avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:11.576000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:11.635318 kernel: audit: type=1400 audit(1707506291.576:1362): avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:11.576000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029c9620 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:18:11.576000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:11.671551 kernel: audit: type=1300 audit(1707506291.576:1361): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029c9620 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:18:11.671724 kernel: audit: type=1327 audit(1707506291.576:1361): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:11.576000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0026ac570 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:18:11.733847 kernel: audit: type=1300 audit(1707506291.576:1362): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0026ac570 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:18:11.576000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:11.762972 kernel: audit: type=1327 audit(1707506291.576:1362): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:12.916000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:12.945013 kernel: audit: type=1400 audit(1707506292.916:1363): avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:12.945207 kernel: audit: type=1400 audit(1707506292.916:1364): avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:12.916000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:12.916000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00b1b6d50 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:18:12.971200 kernel: audit: type=1300 audit(1707506292.916:1364): arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00b1b6d50 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:18:12.916000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:18:12.916000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:12.916000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00b1b6d80 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:18:13.032957 kernel: audit: type=1327 audit(1707506292.916:1364): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:18:12.916000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:18:12.916000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00ac77820 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:18:12.916000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:18:12.963000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:12.963000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00af7b2f0 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:18:12.963000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:18:12.969000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:12.969000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00ac77900 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:18:12.969000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:18:12.969000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:12.969000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00af7b410 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:18:12.969000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:18:16.310477 env[1156]: time="2024-02-09T19:18:16.310428825Z" level=info msg="StopPodSandbox for \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\"" Feb 9 19:18:16.399287 env[1156]: 2024-02-09 19:18:16.354 [WARNING][3946] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0", GenerateName:"calico-kube-controllers-54658fdfbb-", Namespace:"calico-system", SelfLink:"", UID:"8feb3f03-a392-4e58-84f6-be28625a1815", ResourceVersion:"798", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"54658fdfbb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614", Pod:"calico-kube-controllers-54658fdfbb-crt8d", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib0b4c6ef6e3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:16.399287 env[1156]: 2024-02-09 19:18:16.354 [INFO][3946] k8s.go 578: Cleaning up netns ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Feb 9 19:18:16.399287 env[1156]: 2024-02-09 19:18:16.354 [INFO][3946] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" iface="eth0" netns="" Feb 9 19:18:16.399287 env[1156]: 2024-02-09 19:18:16.354 [INFO][3946] k8s.go 585: Releasing IP address(es) ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Feb 9 19:18:16.399287 env[1156]: 2024-02-09 19:18:16.354 [INFO][3946] utils.go 188: Calico CNI releasing IP address ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Feb 9 19:18:16.399287 env[1156]: 2024-02-09 19:18:16.384 [INFO][3952] ipam_plugin.go 415: Releasing address using handleID ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" HandleID="k8s-pod-network.543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" Feb 9 19:18:16.399287 env[1156]: 2024-02-09 19:18:16.385 [INFO][3952] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:16.399287 env[1156]: 2024-02-09 19:18:16.385 [INFO][3952] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:16.399287 env[1156]: 2024-02-09 19:18:16.394 [WARNING][3952] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" HandleID="k8s-pod-network.543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" Feb 9 19:18:16.399287 env[1156]: 2024-02-09 19:18:16.394 [INFO][3952] ipam_plugin.go 443: Releasing address using workloadID ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" HandleID="k8s-pod-network.543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" Feb 9 19:18:16.399287 env[1156]: 2024-02-09 19:18:16.396 [INFO][3952] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:16.399287 env[1156]: 2024-02-09 19:18:16.398 [INFO][3946] k8s.go 591: Teardown processing complete. ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Feb 9 19:18:16.400203 env[1156]: time="2024-02-09T19:18:16.399332250Z" level=info msg="TearDown network for sandbox \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\" successfully" Feb 9 19:18:16.400203 env[1156]: time="2024-02-09T19:18:16.399382963Z" level=info msg="StopPodSandbox for \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\" returns successfully" Feb 9 19:18:16.400203 env[1156]: time="2024-02-09T19:18:16.400142037Z" level=info msg="RemovePodSandbox for \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\"" Feb 9 19:18:16.400381 env[1156]: time="2024-02-09T19:18:16.400188821Z" level=info msg="Forcibly stopping sandbox \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\"" Feb 9 19:18:16.490893 env[1156]: 2024-02-09 19:18:16.447 [WARNING][3973] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0", GenerateName:"calico-kube-controllers-54658fdfbb-", Namespace:"calico-system", SelfLink:"", UID:"8feb3f03-a392-4e58-84f6-be28625a1815", ResourceVersion:"798", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"54658fdfbb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"e0a57af79f93498e6ac9258110d66fece55fb65596a2dfa772b96f520608d614", Pod:"calico-kube-controllers-54658fdfbb-crt8d", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib0b4c6ef6e3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:16.490893 env[1156]: 2024-02-09 19:18:16.448 [INFO][3973] k8s.go 578: Cleaning up netns ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Feb 9 19:18:16.490893 env[1156]: 2024-02-09 19:18:16.448 [INFO][3973] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" iface="eth0" netns="" Feb 9 19:18:16.490893 env[1156]: 2024-02-09 19:18:16.448 [INFO][3973] k8s.go 585: Releasing IP address(es) ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Feb 9 19:18:16.490893 env[1156]: 2024-02-09 19:18:16.448 [INFO][3973] utils.go 188: Calico CNI releasing IP address ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Feb 9 19:18:16.490893 env[1156]: 2024-02-09 19:18:16.476 [INFO][3981] ipam_plugin.go 415: Releasing address using handleID ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" HandleID="k8s-pod-network.543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" Feb 9 19:18:16.490893 env[1156]: 2024-02-09 19:18:16.477 [INFO][3981] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:16.490893 env[1156]: 2024-02-09 19:18:16.477 [INFO][3981] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:16.490893 env[1156]: 2024-02-09 19:18:16.484 [WARNING][3981] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" HandleID="k8s-pod-network.543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" Feb 9 19:18:16.490893 env[1156]: 2024-02-09 19:18:16.484 [INFO][3981] ipam_plugin.go 443: Releasing address using workloadID ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" HandleID="k8s-pod-network.543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--kube--controllers--54658fdfbb--crt8d-eth0" Feb 9 19:18:16.490893 env[1156]: 2024-02-09 19:18:16.486 [INFO][3981] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:16.490893 env[1156]: 2024-02-09 19:18:16.488 [INFO][3973] k8s.go 591: Teardown processing complete. ContainerID="543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97" Feb 9 19:18:16.492281 env[1156]: time="2024-02-09T19:18:16.492238870Z" level=info msg="TearDown network for sandbox \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\" successfully" Feb 9 19:18:16.498299 env[1156]: time="2024-02-09T19:18:16.498247681Z" level=info msg="RemovePodSandbox \"543a467382935a783e94af2c2ac365263b263b4141b059256860534ff42b2e97\" returns successfully" Feb 9 19:18:16.499112 env[1156]: time="2024-02-09T19:18:16.499036475Z" level=info msg="StopPodSandbox for \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\"" Feb 9 19:18:16.584000 env[1156]: 2024-02-09 19:18:16.547 [WARNING][3999] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"63ac1e07-6f01-4725-930f-57f59f86c2e5", ResourceVersion:"770", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3", Pod:"coredns-5d78c9869d-vb9zx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6253f898301", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:16.584000 env[1156]: 2024-02-09 19:18:16.547 [INFO][3999] k8s.go 578: Cleaning up netns ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Feb 9 19:18:16.584000 env[1156]: 2024-02-09 19:18:16.547 [INFO][3999] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" iface="eth0" netns="" Feb 9 19:18:16.584000 env[1156]: 2024-02-09 19:18:16.547 [INFO][3999] k8s.go 585: Releasing IP address(es) ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Feb 9 19:18:16.584000 env[1156]: 2024-02-09 19:18:16.547 [INFO][3999] utils.go 188: Calico CNI releasing IP address ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Feb 9 19:18:16.584000 env[1156]: 2024-02-09 19:18:16.571 [INFO][4005] ipam_plugin.go 415: Releasing address using handleID ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" HandleID="k8s-pod-network.d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" Feb 9 19:18:16.584000 env[1156]: 2024-02-09 19:18:16.572 [INFO][4005] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:16.584000 env[1156]: 2024-02-09 19:18:16.572 [INFO][4005] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:16.584000 env[1156]: 2024-02-09 19:18:16.579 [WARNING][4005] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" HandleID="k8s-pod-network.d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" Feb 9 19:18:16.584000 env[1156]: 2024-02-09 19:18:16.579 [INFO][4005] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" HandleID="k8s-pod-network.d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" Feb 9 19:18:16.584000 env[1156]: 2024-02-09 19:18:16.581 [INFO][4005] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:16.584000 env[1156]: 2024-02-09 19:18:16.582 [INFO][3999] k8s.go 591: Teardown processing complete. ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Feb 9 19:18:16.585752 env[1156]: time="2024-02-09T19:18:16.585665323Z" level=info msg="TearDown network for sandbox \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\" successfully" Feb 9 19:18:16.586082 env[1156]: time="2024-02-09T19:18:16.586003873Z" level=info msg="StopPodSandbox for \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\" returns successfully" Feb 9 19:18:16.586704 env[1156]: time="2024-02-09T19:18:16.586665207Z" level=info msg="RemovePodSandbox for \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\"" Feb 9 19:18:16.586843 env[1156]: time="2024-02-09T19:18:16.586712064Z" level=info msg="Forcibly stopping sandbox \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\"" Feb 9 19:18:16.688391 env[1156]: 2024-02-09 19:18:16.636 [WARNING][4023] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"63ac1e07-6f01-4725-930f-57f59f86c2e5", ResourceVersion:"770", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"25df0bf99ec060117d1bf7be3bb1bbf0d763e094e171bf15947401c724d21ee3", Pod:"coredns-5d78c9869d-vb9zx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6253f898301", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:16.688391 env[1156]: 2024-02-09 19:18:16.637 [INFO][4023] k8s.go 578: Cleaning up netns ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Feb 9 19:18:16.688391 env[1156]: 2024-02-09 19:18:16.637 [INFO][4023] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" iface="eth0" netns="" Feb 9 19:18:16.688391 env[1156]: 2024-02-09 19:18:16.637 [INFO][4023] k8s.go 585: Releasing IP address(es) ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Feb 9 19:18:16.688391 env[1156]: 2024-02-09 19:18:16.637 [INFO][4023] utils.go 188: Calico CNI releasing IP address ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Feb 9 19:18:16.688391 env[1156]: 2024-02-09 19:18:16.673 [INFO][4029] ipam_plugin.go 415: Releasing address using handleID ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" HandleID="k8s-pod-network.d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" Feb 9 19:18:16.688391 env[1156]: 2024-02-09 19:18:16.674 [INFO][4029] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:16.688391 env[1156]: 2024-02-09 19:18:16.674 [INFO][4029] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:16.688391 env[1156]: 2024-02-09 19:18:16.683 [WARNING][4029] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" HandleID="k8s-pod-network.d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" Feb 9 19:18:16.688391 env[1156]: 2024-02-09 19:18:16.683 [INFO][4029] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" HandleID="k8s-pod-network.d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--vb9zx-eth0" Feb 9 19:18:16.688391 env[1156]: 2024-02-09 19:18:16.685 [INFO][4029] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:16.688391 env[1156]: 2024-02-09 19:18:16.686 [INFO][4023] k8s.go 591: Teardown processing complete. ContainerID="d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53" Feb 9 19:18:16.689124 env[1156]: time="2024-02-09T19:18:16.689052227Z" level=info msg="TearDown network for sandbox \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\" successfully" Feb 9 19:18:16.694582 env[1156]: time="2024-02-09T19:18:16.694490263Z" level=info msg="RemovePodSandbox \"d55fcdddb54b3ac937f48b25aa3f9a9ab7971b944c517fd6b5b002c700d1dd53\" returns successfully" Feb 9 19:18:16.695649 env[1156]: time="2024-02-09T19:18:16.695562099Z" level=info msg="StopPodSandbox for \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\"" Feb 9 19:18:16.784645 env[1156]: 2024-02-09 19:18:16.746 [WARNING][4048] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf", ResourceVersion:"775", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a", Pod:"coredns-5d78c9869d-djfsf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calief6fb63b2b8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:16.784645 env[1156]: 2024-02-09 19:18:16.747 [INFO][4048] k8s.go 578: Cleaning up netns ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Feb 9 19:18:16.784645 env[1156]: 2024-02-09 19:18:16.747 [INFO][4048] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" iface="eth0" netns="" Feb 9 19:18:16.784645 env[1156]: 2024-02-09 19:18:16.747 [INFO][4048] k8s.go 585: Releasing IP address(es) ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Feb 9 19:18:16.784645 env[1156]: 2024-02-09 19:18:16.747 [INFO][4048] utils.go 188: Calico CNI releasing IP address ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Feb 9 19:18:16.784645 env[1156]: 2024-02-09 19:18:16.773 [INFO][4054] ipam_plugin.go 415: Releasing address using handleID ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" HandleID="k8s-pod-network.2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" Feb 9 19:18:16.784645 env[1156]: 2024-02-09 19:18:16.773 [INFO][4054] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:16.784645 env[1156]: 2024-02-09 19:18:16.773 [INFO][4054] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:16.784645 env[1156]: 2024-02-09 19:18:16.780 [WARNING][4054] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" HandleID="k8s-pod-network.2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" Feb 9 19:18:16.784645 env[1156]: 2024-02-09 19:18:16.780 [INFO][4054] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" HandleID="k8s-pod-network.2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" Feb 9 19:18:16.784645 env[1156]: 2024-02-09 19:18:16.782 [INFO][4054] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:16.784645 env[1156]: 2024-02-09 19:18:16.783 [INFO][4048] k8s.go 591: Teardown processing complete. ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Feb 9 19:18:16.785453 env[1156]: time="2024-02-09T19:18:16.784687969Z" level=info msg="TearDown network for sandbox \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\" successfully" Feb 9 19:18:16.785453 env[1156]: time="2024-02-09T19:18:16.784733449Z" level=info msg="StopPodSandbox for \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\" returns successfully" Feb 9 19:18:16.785729 env[1156]: time="2024-02-09T19:18:16.785697990Z" level=info msg="RemovePodSandbox for \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\"" Feb 9 19:18:16.785977 env[1156]: time="2024-02-09T19:18:16.785888497Z" level=info msg="Forcibly stopping sandbox \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\"" Feb 9 19:18:16.901539 env[1156]: 2024-02-09 19:18:16.828 [WARNING][4072] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"cdb6f9d2-7200-4e22-8b78-b5312f5c6eaf", ResourceVersion:"775", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"f092264387c52d01fdffa4b704585f31b540a738ed1eac00ca3b5b9471be797a", Pod:"coredns-5d78c9869d-djfsf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calief6fb63b2b8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:16.901539 env[1156]: 2024-02-09 19:18:16.828 [INFO][4072] k8s.go 578: Cleaning up netns ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Feb 9 19:18:16.901539 env[1156]: 2024-02-09 19:18:16.828 [INFO][4072] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" iface="eth0" netns="" Feb 9 19:18:16.901539 env[1156]: 2024-02-09 19:18:16.828 [INFO][4072] k8s.go 585: Releasing IP address(es) ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Feb 9 19:18:16.901539 env[1156]: 2024-02-09 19:18:16.828 [INFO][4072] utils.go 188: Calico CNI releasing IP address ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Feb 9 19:18:16.901539 env[1156]: 2024-02-09 19:18:16.887 [INFO][4078] ipam_plugin.go 415: Releasing address using handleID ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" HandleID="k8s-pod-network.2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" Feb 9 19:18:16.901539 env[1156]: 2024-02-09 19:18:16.888 [INFO][4078] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:16.901539 env[1156]: 2024-02-09 19:18:16.888 [INFO][4078] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:16.901539 env[1156]: 2024-02-09 19:18:16.895 [WARNING][4078] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" HandleID="k8s-pod-network.2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" Feb 9 19:18:16.901539 env[1156]: 2024-02-09 19:18:16.895 [INFO][4078] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" HandleID="k8s-pod-network.2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--djfsf-eth0" Feb 9 19:18:16.901539 env[1156]: 2024-02-09 19:18:16.897 [INFO][4078] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:16.901539 env[1156]: 2024-02-09 19:18:16.898 [INFO][4072] k8s.go 591: Teardown processing complete. ContainerID="2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f" Feb 9 19:18:16.901539 env[1156]: time="2024-02-09T19:18:16.899793158Z" level=info msg="TearDown network for sandbox \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\" successfully" Feb 9 19:18:16.904719 env[1156]: time="2024-02-09T19:18:16.904668176Z" level=info msg="RemovePodSandbox \"2bccd7ef9426201f0e6874fd69fb82024cd9d1ef78fb3fc13d1e392ea316670f\" returns successfully" Feb 9 19:18:16.905355 env[1156]: time="2024-02-09T19:18:16.905297253Z" level=info msg="StopPodSandbox for \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\"" Feb 9 19:18:16.997014 env[1156]: 2024-02-09 19:18:16.953 [WARNING][4097] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"77063012-a45d-44ad-b8fb-c0d671aa8bc5", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb", Pod:"csi-node-driver-257w5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calicde1cdb5044", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:16.997014 env[1156]: 2024-02-09 19:18:16.953 [INFO][4097] k8s.go 578: Cleaning up netns ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Feb 9 19:18:16.997014 env[1156]: 2024-02-09 19:18:16.953 [INFO][4097] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" iface="eth0" netns="" Feb 9 19:18:16.997014 env[1156]: 2024-02-09 19:18:16.953 [INFO][4097] k8s.go 585: Releasing IP address(es) ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Feb 9 19:18:16.997014 env[1156]: 2024-02-09 19:18:16.953 [INFO][4097] utils.go 188: Calico CNI releasing IP address ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Feb 9 19:18:16.997014 env[1156]: 2024-02-09 19:18:16.981 [INFO][4103] ipam_plugin.go 415: Releasing address using handleID ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" HandleID="k8s-pod-network.56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" Feb 9 19:18:16.997014 env[1156]: 2024-02-09 19:18:16.981 [INFO][4103] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:16.997014 env[1156]: 2024-02-09 19:18:16.981 [INFO][4103] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:16.997014 env[1156]: 2024-02-09 19:18:16.990 [WARNING][4103] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" HandleID="k8s-pod-network.56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" Feb 9 19:18:16.997014 env[1156]: 2024-02-09 19:18:16.990 [INFO][4103] ipam_plugin.go 443: Releasing address using workloadID ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" HandleID="k8s-pod-network.56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" Feb 9 19:18:16.997014 env[1156]: 2024-02-09 19:18:16.994 [INFO][4103] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:16.997014 env[1156]: 2024-02-09 19:18:16.995 [INFO][4097] k8s.go 591: Teardown processing complete. ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Feb 9 19:18:16.997893 env[1156]: time="2024-02-09T19:18:16.997061421Z" level=info msg="TearDown network for sandbox \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\" successfully" Feb 9 19:18:16.997893 env[1156]: time="2024-02-09T19:18:16.997105227Z" level=info msg="StopPodSandbox for \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\" returns successfully" Feb 9 19:18:16.997893 env[1156]: time="2024-02-09T19:18:16.997757309Z" level=info msg="RemovePodSandbox for \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\"" Feb 9 19:18:16.997893 env[1156]: time="2024-02-09T19:18:16.997802201Z" level=info msg="Forcibly stopping sandbox \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\"" Feb 9 19:18:17.092004 env[1156]: 2024-02-09 19:18:17.043 [WARNING][4122] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"77063012-a45d-44ad-b8fb-c0d671aa8bc5", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"69ef88888e477bbd60cf53de8ba49ef012859ae1310bfe72de77e4fd249274fb", Pod:"csi-node-driver-257w5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calicde1cdb5044", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:17.092004 env[1156]: 2024-02-09 19:18:17.044 [INFO][4122] k8s.go 578: Cleaning up netns ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Feb 9 19:18:17.092004 env[1156]: 2024-02-09 19:18:17.044 [INFO][4122] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" iface="eth0" netns="" Feb 9 19:18:17.092004 env[1156]: 2024-02-09 19:18:17.044 [INFO][4122] k8s.go 585: Releasing IP address(es) ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Feb 9 19:18:17.092004 env[1156]: 2024-02-09 19:18:17.044 [INFO][4122] utils.go 188: Calico CNI releasing IP address ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Feb 9 19:18:17.092004 env[1156]: 2024-02-09 19:18:17.074 [INFO][4128] ipam_plugin.go 415: Releasing address using handleID ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" HandleID="k8s-pod-network.56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" Feb 9 19:18:17.092004 env[1156]: 2024-02-09 19:18:17.074 [INFO][4128] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:17.092004 env[1156]: 2024-02-09 19:18:17.074 [INFO][4128] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:17.092004 env[1156]: 2024-02-09 19:18:17.086 [WARNING][4128] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" HandleID="k8s-pod-network.56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" Feb 9 19:18:17.092004 env[1156]: 2024-02-09 19:18:17.086 [INFO][4128] ipam_plugin.go 443: Releasing address using workloadID ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" HandleID="k8s-pod-network.56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-csi--node--driver--257w5-eth0" Feb 9 19:18:17.092004 env[1156]: 2024-02-09 19:18:17.089 [INFO][4128] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:17.092004 env[1156]: 2024-02-09 19:18:17.090 [INFO][4122] k8s.go 591: Teardown processing complete. ContainerID="56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7" Feb 9 19:18:17.092851 env[1156]: time="2024-02-09T19:18:17.092011680Z" level=info msg="TearDown network for sandbox \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\" successfully" Feb 9 19:18:17.097075 env[1156]: time="2024-02-09T19:18:17.097019454Z" level=info msg="RemovePodSandbox \"56658790b4edf059cc013d808a3ddbe63b9dca23d8631eca06db905c1da193f7\" returns successfully" Feb 9 19:18:18.357259 systemd[1]: run-containerd-runc-k8s.io-23d83520fc51c052f40ed4b42bbf5503e00251786ddbe5b7882056245b992956-runc.XnASsM.mount: Deactivated successfully. Feb 9 19:18:20.208055 systemd[1]: Started sshd@9-10.128.0.97:22-147.75.109.163:59692.service. Feb 9 19:18:20.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.97:22-147.75.109.163:59692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:20.238686 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 9 19:18:20.238829 kernel: audit: type=1130 audit(1707506300.207:1369): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.97:22-147.75.109.163:59692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:20.282126 systemd[1]: run-containerd-runc-k8s.io-c2fdf6cf7c6108010741b89298495bf493ef687fcd2848998964175dd3dcd160-runc.4u5ROK.mount: Deactivated successfully. Feb 9 19:18:20.505000 audit[4167]: USER_ACCT pid=4167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:20.536523 sshd[4167]: Accepted publickey for core from 147.75.109.163 port 59692 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:18:20.537014 kernel: audit: type=1101 audit(1707506300.505:1370): pid=4167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:20.535000 audit[4167]: CRED_ACQ pid=4167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:20.545917 systemd[1]: Started session-10.scope. Feb 9 19:18:20.537866 sshd[4167]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:20.547710 systemd-logind[1136]: New session 10 of user core. Feb 9 19:18:20.564013 kernel: audit: type=1103 audit(1707506300.535:1371): pid=4167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:20.564146 kernel: audit: type=1006 audit(1707506300.535:1372): pid=4167 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 19:18:20.535000 audit[4167]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf722c880 a2=3 a3=0 items=0 ppid=1 pid=4167 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:20.580176 kernel: audit: type=1300 audit(1707506300.535:1372): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf722c880 a2=3 a3=0 items=0 ppid=1 pid=4167 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:20.535000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:20.617447 kernel: audit: type=1327 audit(1707506300.535:1372): proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:20.557000 audit[4167]: USER_START pid=4167 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:20.650210 kernel: audit: type=1105 audit(1707506300.557:1373): pid=4167 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:20.651441 kernel: audit: type=1103 audit(1707506300.561:1374): pid=4191 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:20.561000 audit[4191]: CRED_ACQ pid=4191 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:20.833789 sshd[4167]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:20.835000 audit[4167]: USER_END pid=4167 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:20.839554 systemd[1]: sshd@9-10.128.0.97:22-147.75.109.163:59692.service: Deactivated successfully. Feb 9 19:18:20.840749 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 19:18:20.843893 systemd-logind[1136]: Session 10 logged out. Waiting for processes to exit. Feb 9 19:18:20.845891 systemd-logind[1136]: Removed session 10. Feb 9 19:18:20.836000 audit[4167]: CRED_DISP pid=4167 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:20.893958 kernel: audit: type=1106 audit(1707506300.835:1375): pid=4167 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:20.894123 kernel: audit: type=1104 audit(1707506300.836:1376): pid=4167 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:20.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.97:22-147.75.109.163:59692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:22.796104 systemd[1]: run-containerd-runc-k8s.io-23d83520fc51c052f40ed4b42bbf5503e00251786ddbe5b7882056245b992956-runc.bfUj3y.mount: Deactivated successfully. Feb 9 19:18:25.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.97:22-147.75.109.163:44154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:25.880220 systemd[1]: Started sshd@10-10.128.0.97:22-147.75.109.163:44154.service. Feb 9 19:18:25.885877 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:18:25.885987 kernel: audit: type=1130 audit(1707506305.879:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.97:22-147.75.109.163:44154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:26.171000 audit[4225]: USER_ACCT pid=4225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:26.173282 sshd[4225]: Accepted publickey for core from 147.75.109.163 port 44154 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:18:26.203237 kernel: audit: type=1101 audit(1707506306.171:1379): pid=4225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:26.202000 audit[4225]: CRED_ACQ pid=4225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:26.203771 sshd[4225]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:26.212520 systemd[1]: Started session-11.scope. Feb 9 19:18:26.214577 systemd-logind[1136]: New session 11 of user core. Feb 9 19:18:26.245391 kernel: audit: type=1103 audit(1707506306.202:1380): pid=4225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:26.245568 kernel: audit: type=1006 audit(1707506306.202:1381): pid=4225 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 19:18:26.245617 kernel: audit: type=1300 audit(1707506306.202:1381): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce7a17610 a2=3 a3=0 items=0 ppid=1 pid=4225 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:26.202000 audit[4225]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce7a17610 a2=3 a3=0 items=0 ppid=1 pid=4225 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:26.202000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:26.283213 kernel: audit: type=1327 audit(1707506306.202:1381): proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:26.283390 kernel: audit: type=1105 audit(1707506306.223:1382): pid=4225 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:26.223000 audit[4225]: USER_START pid=4225 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:26.226000 audit[4227]: CRED_ACQ pid=4227 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:26.339964 kernel: audit: type=1103 audit(1707506306.226:1383): pid=4227 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:26.502469 sshd[4225]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:26.502000 audit[4225]: USER_END pid=4225 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:26.545711 kernel: audit: type=1106 audit(1707506306.502:1384): pid=4225 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:26.545846 kernel: audit: type=1104 audit(1707506306.502:1385): pid=4225 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:26.502000 audit[4225]: CRED_DISP pid=4225 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:26.539279 systemd-logind[1136]: Session 11 logged out. Waiting for processes to exit. Feb 9 19:18:26.541615 systemd[1]: sshd@10-10.128.0.97:22-147.75.109.163:44154.service: Deactivated successfully. Feb 9 19:18:26.542792 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 19:18:26.544855 systemd-logind[1136]: Removed session 11. Feb 9 19:18:26.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.97:22-147.75.109.163:44154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:26.913000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:26.913000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008a81c0 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:18:26.913000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:26.915000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:26.915000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00065fd20 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:18:26.915000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:26.918000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:26.918000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c7c020 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:18:26.918000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:26.926000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:26.926000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c7c320 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:18:26.926000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:31.550850 systemd[1]: Started sshd@11-10.128.0.97:22-147.75.109.163:44168.service. Feb 9 19:18:31.582337 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 19:18:31.582504 kernel: audit: type=1130 audit(1707506311.550:1391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.97:22-147.75.109.163:44168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:31.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.97:22-147.75.109.163:44168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:31.845000 audit[4241]: USER_ACCT pid=4241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:31.876321 sshd[4241]: Accepted publickey for core from 147.75.109.163 port 44168 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:18:31.877116 kernel: audit: type=1101 audit(1707506311.845:1392): pid=4241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:31.877420 sshd[4241]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:31.875000 audit[4241]: CRED_ACQ pid=4241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:31.887081 systemd-logind[1136]: New session 12 of user core. Feb 9 19:18:31.888119 systemd[1]: Started session-12.scope. Feb 9 19:18:31.919984 kernel: audit: type=1103 audit(1707506311.875:1393): pid=4241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:31.920259 kernel: audit: type=1006 audit(1707506311.875:1394): pid=4241 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 19:18:31.875000 audit[4241]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6de123d0 a2=3 a3=0 items=0 ppid=1 pid=4241 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:31.948537 kernel: audit: type=1300 audit(1707506311.875:1394): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6de123d0 a2=3 a3=0 items=0 ppid=1 pid=4241 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:31.948720 kernel: audit: type=1327 audit(1707506311.875:1394): proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:31.875000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:31.892000 audit[4241]: USER_START pid=4241 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:31.990454 kernel: audit: type=1105 audit(1707506311.892:1395): pid=4241 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:31.990635 kernel: audit: type=1103 audit(1707506311.897:1396): pid=4243 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:31.897000 audit[4243]: CRED_ACQ pid=4243 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:32.150480 sshd[4241]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:32.152000 audit[4241]: USER_END pid=4241 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:32.156120 systemd[1]: sshd@11-10.128.0.97:22-147.75.109.163:44168.service: Deactivated successfully. Feb 9 19:18:32.157311 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 19:18:32.160709 systemd-logind[1136]: Session 12 logged out. Waiting for processes to exit. Feb 9 19:18:32.162484 systemd-logind[1136]: Removed session 12. Feb 9 19:18:32.186052 kernel: audit: type=1106 audit(1707506312.152:1397): pid=4241 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:32.186228 kernel: audit: type=1104 audit(1707506312.152:1398): pid=4241 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:32.152000 audit[4241]: CRED_DISP pid=4241 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:32.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.97:22-147.75.109.163:44168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:37.201287 systemd[1]: Started sshd@12-10.128.0.97:22-147.75.109.163:42604.service. Feb 9 19:18:37.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.97:22-147.75.109.163:42604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:37.207658 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:18:37.207759 kernel: audit: type=1130 audit(1707506317.201:1400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.97:22-147.75.109.163:42604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:37.524000 audit[4254]: USER_ACCT pid=4254 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:37.527337 sshd[4254]: Accepted publickey for core from 147.75.109.163 port 42604 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:18:37.555978 kernel: audit: type=1101 audit(1707506317.524:1401): pid=4254 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:37.556439 sshd[4254]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:37.554000 audit[4254]: CRED_ACQ pid=4254 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:37.565496 systemd[1]: Started session-13.scope. Feb 9 19:18:37.567594 systemd-logind[1136]: New session 13 of user core. Feb 9 19:18:37.584066 kernel: audit: type=1103 audit(1707506317.554:1402): pid=4254 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:37.602963 kernel: audit: type=1006 audit(1707506317.554:1403): pid=4254 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 9 19:18:37.554000 audit[4254]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe43b69890 a2=3 a3=0 items=0 ppid=1 pid=4254 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:37.554000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:37.642213 kernel: audit: type=1300 audit(1707506317.554:1403): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe43b69890 a2=3 a3=0 items=0 ppid=1 pid=4254 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:37.642346 kernel: audit: type=1327 audit(1707506317.554:1403): proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:37.577000 audit[4254]: USER_START pid=4254 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:37.684949 kernel: audit: type=1105 audit(1707506317.577:1404): pid=4254 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:37.685141 kernel: audit: type=1103 audit(1707506317.585:1405): pid=4256 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:37.585000 audit[4256]: CRED_ACQ pid=4256 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:37.901876 sshd[4254]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:37.902000 audit[4254]: USER_END pid=4254 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:37.906780 systemd[1]: sshd@12-10.128.0.97:22-147.75.109.163:42604.service: Deactivated successfully. Feb 9 19:18:37.907987 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 19:18:37.910635 systemd-logind[1136]: Session 13 logged out. Waiting for processes to exit. Feb 9 19:18:37.912275 systemd-logind[1136]: Removed session 13. Feb 9 19:18:37.902000 audit[4254]: CRED_DISP pid=4254 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:37.960856 kernel: audit: type=1106 audit(1707506317.902:1406): pid=4254 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:37.961681 kernel: audit: type=1104 audit(1707506317.902:1407): pid=4254 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:37.965492 systemd[1]: Started sshd@13-10.128.0.97:22-147.75.109.163:42618.service. Feb 9 19:18:37.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.97:22-147.75.109.163:42604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:37.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.97:22-147.75.109.163:42618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:38.264000 audit[4267]: USER_ACCT pid=4267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.266209 sshd[4267]: Accepted publickey for core from 147.75.109.163 port 42618 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:18:38.266000 audit[4267]: CRED_ACQ pid=4267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.267000 audit[4267]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe302d3630 a2=3 a3=0 items=0 ppid=1 pid=4267 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:38.267000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:38.268770 sshd[4267]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:38.277293 systemd[1]: Started session-14.scope. Feb 9 19:18:38.279278 systemd-logind[1136]: New session 14 of user core. Feb 9 19:18:38.287000 audit[4267]: USER_START pid=4267 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.291000 audit[4269]: CRED_ACQ pid=4269 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:39.827237 sshd[4267]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:39.828000 audit[4267]: USER_END pid=4267 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:39.829000 audit[4267]: CRED_DISP pid=4267 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:39.833499 systemd-logind[1136]: Session 14 logged out. Waiting for processes to exit. Feb 9 19:18:39.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.97:22-147.75.109.163:42618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:39.836021 systemd[1]: sshd@13-10.128.0.97:22-147.75.109.163:42618.service: Deactivated successfully. Feb 9 19:18:39.837249 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 19:18:39.840724 systemd-logind[1136]: Removed session 14. Feb 9 19:18:39.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.97:22-147.75.109.163:42634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:39.879149 systemd[1]: Started sshd@14-10.128.0.97:22-147.75.109.163:42634.service. Feb 9 19:18:40.170000 audit[4283]: USER_ACCT pid=4283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:40.172967 sshd[4283]: Accepted publickey for core from 147.75.109.163 port 42634 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:18:40.172000 audit[4283]: CRED_ACQ pid=4283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:40.173000 audit[4283]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0867d590 a2=3 a3=0 items=0 ppid=1 pid=4283 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:40.173000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:40.175149 sshd[4283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:40.183035 systemd-logind[1136]: New session 15 of user core. Feb 9 19:18:40.184431 systemd[1]: Started session-15.scope. Feb 9 19:18:40.192000 audit[4283]: USER_START pid=4283 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:40.194000 audit[4285]: CRED_ACQ pid=4285 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:40.468455 sshd[4283]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:40.470000 audit[4283]: USER_END pid=4283 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:40.470000 audit[4283]: CRED_DISP pid=4283 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:40.474114 systemd[1]: sshd@14-10.128.0.97:22-147.75.109.163:42634.service: Deactivated successfully. Feb 9 19:18:40.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.97:22-147.75.109.163:42634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:40.475485 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 19:18:40.476919 systemd-logind[1136]: Session 15 logged out. Waiting for processes to exit. Feb 9 19:18:40.478456 systemd-logind[1136]: Removed session 15. Feb 9 19:18:45.518265 systemd[1]: Started sshd@15-10.128.0.97:22-147.75.109.163:51948.service. Feb 9 19:18:45.549622 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 19:18:45.549801 kernel: audit: type=1130 audit(1707506325.517:1427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.97:22-147.75.109.163:51948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:45.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.97:22-147.75.109.163:51948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:45.813000 audit[4303]: USER_ACCT pid=4303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.845228 kernel: audit: type=1101 audit(1707506325.813:1428): pid=4303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.845369 sshd[4303]: Accepted publickey for core from 147.75.109.163 port 51948 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:18:45.845481 sshd[4303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:45.843000 audit[4303]: CRED_ACQ pid=4303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.854792 systemd[1]: Started session-16.scope. Feb 9 19:18:45.857010 systemd-logind[1136]: New session 16 of user core. Feb 9 19:18:45.887773 kernel: audit: type=1103 audit(1707506325.843:1429): pid=4303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.887923 kernel: audit: type=1006 audit(1707506325.843:1430): pid=4303 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 19:18:45.888000 kernel: audit: type=1300 audit(1707506325.843:1430): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa03e7960 a2=3 a3=0 items=0 ppid=1 pid=4303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:45.843000 audit[4303]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa03e7960 a2=3 a3=0 items=0 ppid=1 pid=4303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:45.843000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:45.925459 kernel: audit: type=1327 audit(1707506325.843:1430): proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:45.925606 kernel: audit: type=1105 audit(1707506325.861:1431): pid=4303 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.861000 audit[4303]: USER_START pid=4303 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.866000 audit[4305]: CRED_ACQ pid=4305 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.982331 kernel: audit: type=1103 audit(1707506325.866:1432): pid=4305 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:46.117579 sshd[4303]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:46.119000 audit[4303]: USER_END pid=4303 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:46.153109 kernel: audit: type=1106 audit(1707506326.119:1433): pid=4303 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:46.119000 audit[4303]: CRED_DISP pid=4303 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:46.155146 systemd-logind[1136]: Session 16 logged out. Waiting for processes to exit. Feb 9 19:18:46.157697 systemd[1]: sshd@15-10.128.0.97:22-147.75.109.163:51948.service: Deactivated successfully. Feb 9 19:18:46.158879 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 19:18:46.161338 systemd-logind[1136]: Removed session 16. Feb 9 19:18:46.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.97:22-147.75.109.163:51948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:46.178131 kernel: audit: type=1104 audit(1707506326.119:1434): pid=4303 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:48.357898 systemd[1]: run-containerd-runc-k8s.io-23d83520fc51c052f40ed4b42bbf5503e00251786ddbe5b7882056245b992956-runc.q84EqT.mount: Deactivated successfully. Feb 9 19:18:51.164849 systemd[1]: Started sshd@16-10.128.0.97:22-147.75.109.163:51954.service. Feb 9 19:18:51.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.97:22-147.75.109.163:51954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:51.170818 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:18:51.170952 kernel: audit: type=1130 audit(1707506331.164:1436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.97:22-147.75.109.163:51954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:51.458000 audit[4357]: USER_ACCT pid=4357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:51.459430 sshd[4357]: Accepted publickey for core from 147.75.109.163 port 51954 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:18:51.488989 kernel: audit: type=1101 audit(1707506331.458:1437): pid=4357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:51.488000 audit[4357]: CRED_ACQ pid=4357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:51.490331 sshd[4357]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:51.504481 systemd[1]: Started session-17.scope. Feb 9 19:18:51.506507 systemd-logind[1136]: New session 17 of user core. Feb 9 19:18:51.531778 kernel: audit: type=1103 audit(1707506331.488:1438): pid=4357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:51.536591 kernel: audit: type=1006 audit(1707506331.488:1439): pid=4357 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 19:18:51.536715 kernel: audit: type=1300 audit(1707506331.488:1439): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd77395f0 a2=3 a3=0 items=0 ppid=1 pid=4357 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:51.488000 audit[4357]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd77395f0 a2=3 a3=0 items=0 ppid=1 pid=4357 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:51.488000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:51.570097 kernel: audit: type=1327 audit(1707506331.488:1439): proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:51.514000 audit[4357]: USER_START pid=4357 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:51.602780 kernel: audit: type=1105 audit(1707506331.514:1440): pid=4357 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:51.602985 kernel: audit: type=1103 audit(1707506331.514:1441): pid=4359 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:51.514000 audit[4359]: CRED_ACQ pid=4359 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:51.804757 sshd[4357]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:51.805000 audit[4357]: USER_END pid=4357 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:51.812248 systemd[1]: sshd@16-10.128.0.97:22-147.75.109.163:51954.service: Deactivated successfully. Feb 9 19:18:51.813469 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 19:18:51.815578 systemd-logind[1136]: Session 17 logged out. Waiting for processes to exit. Feb 9 19:18:51.817074 systemd-logind[1136]: Removed session 17. Feb 9 19:18:51.808000 audit[4357]: CRED_DISP pid=4357 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:51.839975 kernel: audit: type=1106 audit(1707506331.805:1442): pid=4357 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:51.840046 kernel: audit: type=1104 audit(1707506331.808:1443): pid=4357 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:51.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.97:22-147.75.109.163:51954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:55.611702 kubelet[2103]: I0209 19:18:55.611640 2103 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:18:55.619742 systemd[1]: Created slice kubepods-besteffort-podfa4ecda7_fc39_4c81_a58a_7b74a26a9313.slice. Feb 9 19:18:55.686107 kubelet[2103]: I0209 19:18:55.686059 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/fa4ecda7-fc39-4c81-a58a-7b74a26a9313-calico-apiserver-certs\") pod \"calico-apiserver-cdc84945d-fmzrp\" (UID: \"fa4ecda7-fc39-4c81-a58a-7b74a26a9313\") " pod="calico-apiserver/calico-apiserver-cdc84945d-fmzrp" Feb 9 19:18:55.686314 kubelet[2103]: I0209 19:18:55.686156 2103 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xbp6s\" (UniqueName: \"kubernetes.io/projected/fa4ecda7-fc39-4c81-a58a-7b74a26a9313-kube-api-access-xbp6s\") pod \"calico-apiserver-cdc84945d-fmzrp\" (UID: \"fa4ecda7-fc39-4c81-a58a-7b74a26a9313\") " pod="calico-apiserver/calico-apiserver-cdc84945d-fmzrp" Feb 9 19:18:55.712000 audit[4369]: NETFILTER_CFG table=filter:113 family=2 entries=8 op=nft_register_rule pid=4369 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:55.712000 audit[4369]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc791bd050 a2=0 a3=7ffc791bd03c items=0 ppid=2242 pid=4369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:55.712000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:55.714000 audit[4369]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4369 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:55.714000 audit[4369]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc791bd050 a2=0 a3=7ffc791bd03c items=0 ppid=2242 pid=4369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:55.714000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:55.747000 audit[4371]: NETFILTER_CFG table=filter:115 family=2 entries=9 op=nft_register_rule pid=4371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:55.747000 audit[4371]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc3cdf6ab0 a2=0 a3=7ffc3cdf6a9c items=0 ppid=2242 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:55.747000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:55.749000 audit[4371]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:55.749000 audit[4371]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc3cdf6ab0 a2=0 a3=7ffc3cdf6a9c items=0 ppid=2242 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:55.749000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:55.788421 kubelet[2103]: E0209 19:18:55.788071 2103 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 19:18:55.788421 kubelet[2103]: E0209 19:18:55.788179 2103 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/fa4ecda7-fc39-4c81-a58a-7b74a26a9313-calico-apiserver-certs podName:fa4ecda7-fc39-4c81-a58a-7b74a26a9313 nodeName:}" failed. No retries permitted until 2024-02-09 19:18:56.288151106 +0000 UTC m=+100.195128944 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/fa4ecda7-fc39-4c81-a58a-7b74a26a9313-calico-apiserver-certs") pod "calico-apiserver-cdc84945d-fmzrp" (UID: "fa4ecda7-fc39-4c81-a58a-7b74a26a9313") : secret "calico-apiserver-certs" not found Feb 9 19:18:56.527147 env[1156]: time="2024-02-09T19:18:56.527083769Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-cdc84945d-fmzrp,Uid:fa4ecda7-fc39-4c81-a58a-7b74a26a9313,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:18:56.726781 systemd-networkd[1030]: cali4a79fe1d08d: Link UP Feb 9 19:18:56.744320 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:18:56.752988 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4a79fe1d08d: link becomes ready Feb 9 19:18:56.757409 systemd-networkd[1030]: cali4a79fe1d08d: Gained carrier Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.611 [INFO][4374] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--apiserver--cdc84945d--fmzrp-eth0 calico-apiserver-cdc84945d- calico-apiserver fa4ecda7-fc39-4c81-a58a-7b74a26a9313 1053 0 2024-02-09 19:18:55 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:cdc84945d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal calico-apiserver-cdc84945d-fmzrp eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali4a79fe1d08d [] []}} ContainerID="f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" Namespace="calico-apiserver" Pod="calico-apiserver-cdc84945d-fmzrp" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--apiserver--cdc84945d--fmzrp-" Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.611 [INFO][4374] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" Namespace="calico-apiserver" Pod="calico-apiserver-cdc84945d-fmzrp" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--apiserver--cdc84945d--fmzrp-eth0" Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.669 [INFO][4385] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" HandleID="k8s-pod-network.f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--apiserver--cdc84945d--fmzrp-eth0" Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.685 [INFO][4385] ipam_plugin.go 268: Auto assigning IP ContainerID="f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" HandleID="k8s-pod-network.f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--apiserver--cdc84945d--fmzrp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002beb30), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", "pod":"calico-apiserver-cdc84945d-fmzrp", "timestamp":"2024-02-09 19:18:56.669569275 +0000 UTC"}, Hostname:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.685 [INFO][4385] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.685 [INFO][4385] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.685 [INFO][4385] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal' Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.687 [INFO][4385] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.692 [INFO][4385] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.696 [INFO][4385] ipam.go 489: Trying affinity for 192.168.21.128/26 host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.698 [INFO][4385] ipam.go 155: Attempting to load block cidr=192.168.21.128/26 host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.701 [INFO][4385] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.128/26 host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.701 [INFO][4385] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.128/26 handle="k8s-pod-network.f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.707 [INFO][4385] ipam.go 1682: Creating new handle: k8s-pod-network.f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.712 [INFO][4385] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.128/26 handle="k8s-pod-network.f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.719 [INFO][4385] ipam.go 1216: Successfully claimed IPs: [192.168.21.133/26] block=192.168.21.128/26 handle="k8s-pod-network.f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.719 [INFO][4385] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.133/26] handle="k8s-pod-network.f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" host="ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal" Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.719 [INFO][4385] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:56.769980 env[1156]: 2024-02-09 19:18:56.719 [INFO][4385] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.133/26] IPv6=[] ContainerID="f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" HandleID="k8s-pod-network.f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" Workload="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--apiserver--cdc84945d--fmzrp-eth0" Feb 9 19:18:56.771320 env[1156]: 2024-02-09 19:18:56.722 [INFO][4374] k8s.go 385: Populated endpoint ContainerID="f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" Namespace="calico-apiserver" Pod="calico-apiserver-cdc84945d-fmzrp" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--apiserver--cdc84945d--fmzrp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--apiserver--cdc84945d--fmzrp-eth0", GenerateName:"calico-apiserver-cdc84945d-", Namespace:"calico-apiserver", SelfLink:"", UID:"fa4ecda7-fc39-4c81-a58a-7b74a26a9313", ResourceVersion:"1053", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 18, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"cdc84945d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-cdc84945d-fmzrp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4a79fe1d08d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:56.771320 env[1156]: 2024-02-09 19:18:56.722 [INFO][4374] k8s.go 386: Calico CNI using IPs: [192.168.21.133/32] ContainerID="f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" Namespace="calico-apiserver" Pod="calico-apiserver-cdc84945d-fmzrp" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--apiserver--cdc84945d--fmzrp-eth0" Feb 9 19:18:56.771320 env[1156]: 2024-02-09 19:18:56.722 [INFO][4374] dataplane_linux.go 68: Setting the host side veth name to cali4a79fe1d08d ContainerID="f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" Namespace="calico-apiserver" Pod="calico-apiserver-cdc84945d-fmzrp" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--apiserver--cdc84945d--fmzrp-eth0" Feb 9 19:18:56.771320 env[1156]: 2024-02-09 19:18:56.755 [INFO][4374] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" Namespace="calico-apiserver" Pod="calico-apiserver-cdc84945d-fmzrp" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--apiserver--cdc84945d--fmzrp-eth0" Feb 9 19:18:56.771320 env[1156]: 2024-02-09 19:18:56.756 [INFO][4374] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" Namespace="calico-apiserver" Pod="calico-apiserver-cdc84945d-fmzrp" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--apiserver--cdc84945d--fmzrp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--apiserver--cdc84945d--fmzrp-eth0", GenerateName:"calico-apiserver-cdc84945d-", Namespace:"calico-apiserver", SelfLink:"", UID:"fa4ecda7-fc39-4c81-a58a-7b74a26a9313", ResourceVersion:"1053", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 18, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"cdc84945d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6d0465d4cd1fb00a2f62.c.flatcar-212911.internal", ContainerID:"f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c", Pod:"calico-apiserver-cdc84945d-fmzrp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4a79fe1d08d", MAC:"66:d7:b2:42:d3:db", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:56.771320 env[1156]: 2024-02-09 19:18:56.767 [INFO][4374] k8s.go 491: Wrote updated endpoint to datastore ContainerID="f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c" Namespace="calico-apiserver" Pod="calico-apiserver-cdc84945d-fmzrp" WorkloadEndpoint="ci--3510--3--2--6d0465d4cd1fb00a2f62.c.flatcar--212911.internal-k8s-calico--apiserver--cdc84945d--fmzrp-eth0" Feb 9 19:18:56.792676 env[1156]: time="2024-02-09T19:18:56.792481726Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:18:56.792676 env[1156]: time="2024-02-09T19:18:56.792583700Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:18:56.792676 env[1156]: time="2024-02-09T19:18:56.792624676Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:18:56.794698 env[1156]: time="2024-02-09T19:18:56.794631060Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c pid=4413 runtime=io.containerd.runc.v2 Feb 9 19:18:56.835924 systemd[1]: Started cri-containerd-f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c.scope. Feb 9 19:18:56.883923 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 19:18:56.884092 kernel: audit: type=1130 audit(1707506336.851:1449): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.97:22-147.75.109.163:33854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:56.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.97:22-147.75.109.163:33854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:56.851748 systemd[1]: Started sshd@17-10.128.0.97:22-147.75.109.163:33854.service. Feb 9 19:18:56.905087 systemd[1]: run-containerd-runc-k8s.io-f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c-runc.td6BJK.mount: Deactivated successfully. Feb 9 19:18:56.920000 audit[4441]: NETFILTER_CFG table=filter:117 family=2 entries=59 op=nft_register_chain pid=4441 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:18:56.939059 kernel: audit: type=1325 audit(1707506336.920:1450): table=filter:117 family=2 entries=59 op=nft_register_chain pid=4441 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:18:56.920000 audit[4441]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffe192214b0 a2=0 a3=7ffe1922149c items=0 ppid=3102 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:56.920000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:18:56.994388 kernel: audit: type=1300 audit(1707506336.920:1450): arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffe192214b0 a2=0 a3=7ffe1922149c items=0 ppid=3102 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:56.994569 kernel: audit: type=1327 audit(1707506336.920:1450): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:18:56.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:57.036423 kernel: audit: type=1400 audit(1707506336.939:1451): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:57.036606 kernel: audit: type=1400 audit(1707506336.939:1452): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:57.057265 kernel: audit: type=1400 audit(1707506336.939:1453): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:57.100788 kernel: audit: type=1400 audit(1707506336.939:1454): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:57.100962 kernel: audit: type=1400 audit(1707506336.939:1455): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:57.122961 kernel: audit: type=1400 audit(1707506336.939:1456): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.939000 audit: BPF prog-id=189 op=LOAD Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4413 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:56.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635616439393532343665366661336533653435626662316335346636 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4413 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:56.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635616439393532343665366661336533653435626662316335346636 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit: BPF prog-id=190 op=LOAD Feb 9 19:18:56.940000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00031f160 items=0 ppid=4413 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:56.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635616439393532343665366661336533653435626662316335346636 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit: BPF prog-id=191 op=LOAD Feb 9 19:18:56.940000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00031f1a8 items=0 ppid=4413 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:56.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635616439393532343665366661336533653435626662316335346636 Feb 9 19:18:56.940000 audit: BPF prog-id=191 op=UNLOAD Feb 9 19:18:56.940000 audit: BPF prog-id=190 op=UNLOAD Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:56.940000 audit: BPF prog-id=192 op=LOAD Feb 9 19:18:56.940000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00031f5b8 items=0 ppid=4413 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:56.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635616439393532343665366661336533653435626662316335346636 Feb 9 19:18:57.173538 env[1156]: time="2024-02-09T19:18:57.173473277Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-cdc84945d-fmzrp,Uid:fa4ecda7-fc39-4c81-a58a-7b74a26a9313,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c\"" Feb 9 19:18:57.181323 kubelet[2103]: E0209 19:18:57.181112 2103 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Feb 9 19:18:57.182824 env[1156]: time="2024-02-09T19:18:57.182775911Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:18:57.258000 audit[4440]: USER_ACCT pid=4440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:57.259687 sshd[4440]: Accepted publickey for core from 147.75.109.163 port 33854 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:18:57.260000 audit[4440]: CRED_ACQ pid=4440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:57.260000 audit[4440]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc50dd5460 a2=3 a3=0 items=0 ppid=1 pid=4440 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:57.260000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:57.262833 sshd[4440]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:57.270558 systemd[1]: Started session-18.scope. Feb 9 19:18:57.271184 systemd-logind[1136]: New session 18 of user core. Feb 9 19:18:57.281000 audit[4440]: USER_START pid=4440 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:57.284000 audit[4455]: CRED_ACQ pid=4455 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:57.558219 sshd[4440]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:57.560000 audit[4440]: USER_END pid=4440 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:57.560000 audit[4440]: CRED_DISP pid=4440 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:57.563814 systemd[1]: sshd@17-10.128.0.97:22-147.75.109.163:33854.service: Deactivated successfully. Feb 9 19:18:57.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.97:22-147.75.109.163:33854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:57.565048 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 19:18:57.565987 systemd-logind[1136]: Session 18 logged out. Waiting for processes to exit. Feb 9 19:18:57.567291 systemd-logind[1136]: Removed session 18. Feb 9 19:18:58.223639 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2868255350.mount: Deactivated successfully. Feb 9 19:18:58.784786 systemd-networkd[1030]: cali4a79fe1d08d: Gained IPv6LL Feb 9 19:19:00.268442 env[1156]: time="2024-02-09T19:19:00.268372915Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:19:00.271197 env[1156]: time="2024-02-09T19:19:00.271137869Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:19:00.275209 env[1156]: time="2024-02-09T19:19:00.275168035Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:19:00.277562 env[1156]: time="2024-02-09T19:19:00.277506424Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:19:00.279676 env[1156]: time="2024-02-09T19:19:00.278676630Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 19:19:00.284851 env[1156]: time="2024-02-09T19:19:00.284624419Z" level=info msg="CreateContainer within sandbox \"f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:19:00.304262 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3678598794.mount: Deactivated successfully. Feb 9 19:19:00.309061 env[1156]: time="2024-02-09T19:19:00.308995146Z" level=info msg="CreateContainer within sandbox \"f5ad995246e6fa3e3e45bfb1c54f634d146227e465ff5158812dd0303b10f08c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0bda1b708b396cdb84cb507a8a3690852d478b761bee8ec6bf93b37b12fb76d9\"" Feb 9 19:19:00.312606 env[1156]: time="2024-02-09T19:19:00.309909407Z" level=info msg="StartContainer for \"0bda1b708b396cdb84cb507a8a3690852d478b761bee8ec6bf93b37b12fb76d9\"" Feb 9 19:19:00.346117 systemd[1]: Started cri-containerd-0bda1b708b396cdb84cb507a8a3690852d478b761bee8ec6bf93b37b12fb76d9.scope. Feb 9 19:19:00.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.381000 audit: BPF prog-id=193 op=LOAD Feb 9 19:19:00.381000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.381000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4413 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:00.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062646131623730386233393663646238346362353037613861333639 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4413 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:00.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062646131623730386233393663646238346362353037613861333639 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit: BPF prog-id=194 op=LOAD Feb 9 19:19:00.382000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ccfa0 items=0 ppid=4413 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:00.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062646131623730386233393663646238346362353037613861333639 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit: BPF prog-id=195 op=LOAD Feb 9 19:19:00.382000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ccfe8 items=0 ppid=4413 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:00.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062646131623730386233393663646238346362353037613861333639 Feb 9 19:19:00.382000 audit: BPF prog-id=195 op=UNLOAD Feb 9 19:19:00.382000 audit: BPF prog-id=194 op=UNLOAD Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:00.382000 audit: BPF prog-id=196 op=LOAD Feb 9 19:19:00.382000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003cd3f8 items=0 ppid=4413 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:00.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062646131623730386233393663646238346362353037613861333639 Feb 9 19:19:00.426706 env[1156]: time="2024-02-09T19:19:00.426639560Z" level=info msg="StartContainer for \"0bda1b708b396cdb84cb507a8a3690852d478b761bee8ec6bf93b37b12fb76d9\" returns successfully" Feb 9 19:19:00.881083 kubelet[2103]: I0209 19:19:00.881039 2103 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-cdc84945d-fmzrp" podStartSLOduration=2.777238076 podCreationTimestamp="2024-02-09 19:18:55 +0000 UTC" firstStartedPulling="2024-02-09 19:18:57.176445064 +0000 UTC m=+101.083422893" lastFinishedPulling="2024-02-09 19:19:00.280177593 +0000 UTC m=+104.187155424" observedRunningTime="2024-02-09 19:19:00.877808855 +0000 UTC m=+104.784786693" watchObservedRunningTime="2024-02-09 19:19:00.880970607 +0000 UTC m=+104.787948445" Feb 9 19:19:00.910000 audit[4502]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4502 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:00.910000 audit[4502]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fffa4f09500 a2=0 a3=7fffa4f094ec items=0 ppid=2242 pid=4502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:00.910000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:00.912000 audit[4502]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4502 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:00.912000 audit[4502]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fffa4f09500 a2=0 a3=7fffa4f094ec items=0 ppid=2242 pid=4502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:00.912000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:01.304000 audit[4483]: AVC avc: denied { watch } for pid=4483 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_18_56.2911971555/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c559,c752 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c559,c752 tclass=file permissive=0 Feb 9 19:19:01.304000 audit[4483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b7c1c0 a2=fc6 a3=0 items=0 ppid=4413 pid=4483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c559,c752 key=(null) Feb 9 19:19:01.304000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:19:02.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.97:22-147.75.109.163:33856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:02.605570 systemd[1]: Started sshd@18-10.128.0.97:22-147.75.109.163:33856.service. Feb 9 19:19:02.637988 kernel: kauditd_printk_skb: 127 callbacks suppressed Feb 9 19:19:02.638170 kernel: audit: type=1130 audit(1707506342.604:1498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.97:22-147.75.109.163:33856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:02.899000 audit[4509]: USER_ACCT pid=4509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.931924 sshd[4509]: Accepted publickey for core from 147.75.109.163 port 33856 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:19:02.932426 kernel: audit: type=1101 audit(1707506342.899:1499): pid=4509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.932589 sshd[4509]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:02.930000 audit[4509]: CRED_ACQ pid=4509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.941620 systemd[1]: Started session-19.scope. Feb 9 19:19:02.943659 systemd-logind[1136]: New session 19 of user core. Feb 9 19:19:02.975467 kernel: audit: type=1103 audit(1707506342.930:1500): pid=4509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.975682 kernel: audit: type=1006 audit(1707506342.930:1501): pid=4509 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 9 19:19:02.975739 kernel: audit: type=1300 audit(1707506342.930:1501): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2af53ed0 a2=3 a3=0 items=0 ppid=1 pid=4509 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:02.930000 audit[4509]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2af53ed0 a2=3 a3=0 items=0 ppid=1 pid=4509 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:02.930000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:03.013393 kernel: audit: type=1327 audit(1707506342.930:1501): proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:03.013583 kernel: audit: type=1105 audit(1707506342.948:1502): pid=4509 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.948000 audit[4509]: USER_START pid=4509 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:03.046431 kernel: audit: type=1103 audit(1707506342.953:1503): pid=4511 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.953000 audit[4511]: CRED_ACQ pid=4511 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:03.215985 sshd[4509]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:03.216000 audit[4509]: USER_END pid=4509 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:03.222169 systemd-logind[1136]: Session 19 logged out. Waiting for processes to exit. Feb 9 19:19:03.224485 systemd[1]: sshd@18-10.128.0.97:22-147.75.109.163:33856.service: Deactivated successfully. Feb 9 19:19:03.225686 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 19:19:03.227856 systemd-logind[1136]: Removed session 19. Feb 9 19:19:03.250970 kernel: audit: type=1106 audit(1707506343.216:1504): pid=4509 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:03.251174 kernel: audit: type=1104 audit(1707506343.217:1505): pid=4509 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:03.217000 audit[4509]: CRED_DISP pid=4509 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:03.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.97:22-147.75.109.163:33856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:03.282404 systemd[1]: Started sshd@19-10.128.0.97:22-147.75.109.163:33872.service. Feb 9 19:19:03.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.97:22-147.75.109.163:33872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:03.572000 audit[4521]: USER_ACCT pid=4521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:03.575469 sshd[4521]: Accepted publickey for core from 147.75.109.163 port 33872 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:19:03.575000 audit[4521]: CRED_ACQ pid=4521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:03.575000 audit[4521]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee38b51e0 a2=3 a3=0 items=0 ppid=1 pid=4521 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:03.575000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:03.577532 sshd[4521]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:03.586588 systemd-logind[1136]: New session 20 of user core. Feb 9 19:19:03.588144 systemd[1]: Started session-20.scope. Feb 9 19:19:03.596000 audit[4521]: USER_START pid=4521 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:03.599000 audit[4524]: CRED_ACQ pid=4524 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:03.672000 audit[4525]: NETFILTER_CFG table=filter:120 family=2 entries=10 op=nft_register_rule pid=4525 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:03.672000 audit[4525]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd91bb6000 a2=0 a3=7ffd91bb5fec items=0 ppid=2242 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:03.672000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:03.675000 audit[4525]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=4525 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:03.675000 audit[4525]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd91bb6000 a2=0 a3=7ffd91bb5fec items=0 ppid=2242 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:03.675000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:03.932551 sshd[4521]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:03.933000 audit[4521]: USER_END pid=4521 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:03.933000 audit[4521]: CRED_DISP pid=4521 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:03.937608 systemd[1]: sshd@19-10.128.0.97:22-147.75.109.163:33872.service: Deactivated successfully. Feb 9 19:19:03.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.97:22-147.75.109.163:33872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:03.938975 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 19:19:03.940149 systemd-logind[1136]: Session 20 logged out. Waiting for processes to exit. Feb 9 19:19:03.941890 systemd-logind[1136]: Removed session 20. Feb 9 19:19:03.981476 systemd[1]: Started sshd@20-10.128.0.97:22-147.75.109.163:33874.service. Feb 9 19:19:03.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.97:22-147.75.109.163:33874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:04.275000 audit[4532]: USER_ACCT pid=4532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:04.277376 sshd[4532]: Accepted publickey for core from 147.75.109.163 port 33874 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:19:04.277000 audit[4532]: CRED_ACQ pid=4532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:04.277000 audit[4532]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc69746280 a2=3 a3=0 items=0 ppid=1 pid=4532 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:04.277000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:04.279389 sshd[4532]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:04.286590 systemd-logind[1136]: New session 21 of user core. Feb 9 19:19:04.287598 systemd[1]: Started session-21.scope. Feb 9 19:19:04.295000 audit[4532]: USER_START pid=4532 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:04.298000 audit[4534]: CRED_ACQ pid=4534 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:05.532000 audit[4546]: NETFILTER_CFG table=filter:122 family=2 entries=10 op=nft_register_rule pid=4546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:05.532000 audit[4546]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd0ce5a070 a2=0 a3=7ffd0ce5a05c items=0 ppid=2242 pid=4546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:05.532000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:05.536000 audit[4546]: NETFILTER_CFG table=nat:123 family=2 entries=20 op=nft_register_rule pid=4546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:05.536000 audit[4546]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd0ce5a070 a2=0 a3=7ffd0ce5a05c items=0 ppid=2242 pid=4546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:05.536000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:05.583913 sshd[4532]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:05.584000 audit[4532]: USER_END pid=4532 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:05.584000 audit[4532]: CRED_DISP pid=4532 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:05.586000 audit[4548]: NETFILTER_CFG table=filter:124 family=2 entries=22 op=nft_register_rule pid=4548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:05.586000 audit[4548]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffcc4226450 a2=0 a3=7ffcc422643c items=0 ppid=2242 pid=4548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:05.586000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:05.589325 systemd-logind[1136]: Session 21 logged out. Waiting for processes to exit. Feb 9 19:19:05.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.97:22-147.75.109.163:33874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:05.589000 audit[4548]: NETFILTER_CFG table=nat:125 family=2 entries=20 op=nft_register_rule pid=4548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:05.589000 audit[4548]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffcc4226450 a2=0 a3=31030 items=0 ppid=2242 pid=4548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:05.589000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:05.591624 systemd[1]: sshd@20-10.128.0.97:22-147.75.109.163:33874.service: Deactivated successfully. Feb 9 19:19:05.592850 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 19:19:05.595002 systemd-logind[1136]: Removed session 21. Feb 9 19:19:05.629270 systemd[1]: Started sshd@21-10.128.0.97:22-147.75.109.163:57924.service. Feb 9 19:19:05.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.97:22-147.75.109.163:57924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:05.921000 audit[4551]: USER_ACCT pid=4551 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:05.922770 sshd[4551]: Accepted publickey for core from 147.75.109.163 port 57924 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:19:05.923000 audit[4551]: CRED_ACQ pid=4551 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:05.923000 audit[4551]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8f319bc0 a2=3 a3=0 items=0 ppid=1 pid=4551 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:05.923000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:05.925335 sshd[4551]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:05.932060 systemd-logind[1136]: New session 22 of user core. Feb 9 19:19:05.932503 systemd[1]: Started session-22.scope. Feb 9 19:19:05.941000 audit[4551]: USER_START pid=4551 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:05.943000 audit[4553]: CRED_ACQ pid=4553 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.661234 sshd[4551]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:06.662000 audit[4551]: USER_END pid=4551 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.662000 audit[4551]: CRED_DISP pid=4551 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.97:22-147.75.109.163:57924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:06.666639 systemd[1]: sshd@21-10.128.0.97:22-147.75.109.163:57924.service: Deactivated successfully. Feb 9 19:19:06.668753 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 19:19:06.670752 systemd-logind[1136]: Session 22 logged out. Waiting for processes to exit. Feb 9 19:19:06.672643 systemd-logind[1136]: Removed session 22. Feb 9 19:19:06.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.97:22-147.75.109.163:57930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:06.706477 systemd[1]: Started sshd@22-10.128.0.97:22-147.75.109.163:57930.service. Feb 9 19:19:07.003000 audit[4561]: USER_ACCT pid=4561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:07.006534 sshd[4561]: Accepted publickey for core from 147.75.109.163 port 57930 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:19:07.006000 audit[4561]: CRED_ACQ pid=4561 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:07.006000 audit[4561]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc27798e60 a2=3 a3=0 items=0 ppid=1 pid=4561 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:07.006000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:07.008647 sshd[4561]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:07.017330 systemd[1]: Started session-23.scope. Feb 9 19:19:07.020349 systemd-logind[1136]: New session 23 of user core. Feb 9 19:19:07.027000 audit[4561]: USER_START pid=4561 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:07.030000 audit[4565]: CRED_ACQ pid=4565 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:07.342163 sshd[4561]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:07.344000 audit[4561]: USER_END pid=4561 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:07.344000 audit[4561]: CRED_DISP pid=4561 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:07.348243 systemd[1]: sshd@22-10.128.0.97:22-147.75.109.163:57930.service: Deactivated successfully. Feb 9 19:19:07.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.97:22-147.75.109.163:57930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:07.349470 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 19:19:07.349995 systemd-logind[1136]: Session 23 logged out. Waiting for processes to exit. Feb 9 19:19:07.351404 systemd-logind[1136]: Removed session 23. Feb 9 19:19:11.577000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:11.587980 kernel: kauditd_printk_skb: 63 callbacks suppressed Feb 9 19:19:11.588165 kernel: audit: type=1400 audit(1707506351.577:1549): avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:11.610986 kernel: audit: type=1300 audit(1707506351.577:1549): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002570300 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:19:11.577000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002570300 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:19:11.577000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:19:11.645836 kernel: audit: type=1327 audit(1707506351.577:1549): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:19:11.577000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:11.699807 kernel: audit: type=1400 audit(1707506351.577:1550): avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:11.699980 kernel: audit: type=1300 audit(1707506351.577:1550): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00111ec90 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:19:11.577000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00111ec90 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:19:11.577000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:19:11.763581 kernel: audit: type=1327 audit(1707506351.577:1550): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:19:12.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.97:22-147.75.109.163:57942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:12.387905 systemd[1]: Started sshd@23-10.128.0.97:22-147.75.109.163:57942.service. Feb 9 19:19:12.413625 kernel: audit: type=1130 audit(1707506352.387:1551): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.97:22-147.75.109.163:57942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:12.694000 audit[4576]: USER_ACCT pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.695556 sshd[4576]: Accepted publickey for core from 147.75.109.163 port 57942 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:19:12.725227 kernel: audit: type=1101 audit(1707506352.694:1552): pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.725883 sshd[4576]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:12.724000 audit[4576]: CRED_ACQ pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.749299 systemd-logind[1136]: New session 24 of user core. Feb 9 19:19:12.756260 kernel: audit: type=1103 audit(1707506352.724:1553): pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.756315 kernel: audit: type=1006 audit(1707506352.724:1554): pid=4576 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 19:19:12.755269 systemd[1]: Started session-24.scope. Feb 9 19:19:12.724000 audit[4576]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8250f480 a2=3 a3=0 items=0 ppid=1 pid=4576 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:12.724000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:12.772000 audit[4576]: USER_START pid=4576 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.775000 audit[4578]: CRED_ACQ pid=4578 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.918000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:12.918000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c01729d6e0 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:19:12.918000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:19:12.918000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:12.918000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c01729d740 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:19:12.918000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:19:12.922000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:12.922000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00942f280 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:19:12.922000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:19:12.964000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:12.964000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c01729d8c0 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:19:12.964000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:19:12.973000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:12.973000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00350c860 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:19:12.973000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:19:12.973000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:12.973000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c001626cf0 a2=fc6 a3=0 items=0 ppid=1840 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c917,c1016 key=(null) Feb 9 19:19:12.973000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3937002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:19:13.028621 sshd[4576]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:13.029000 audit[4576]: USER_END pid=4576 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:13.029000 audit[4576]: CRED_DISP pid=4576 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:13.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.97:22-147.75.109.163:57942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:13.033036 systemd[1]: sshd@23-10.128.0.97:22-147.75.109.163:57942.service: Deactivated successfully. Feb 9 19:19:13.034343 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 19:19:13.035594 systemd-logind[1136]: Session 24 logged out. Waiting for processes to exit. Feb 9 19:19:13.036890 systemd-logind[1136]: Removed session 24. Feb 9 19:19:13.649000 audit[4587]: NETFILTER_CFG table=filter:126 family=2 entries=22 op=nft_register_rule pid=4587 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:13.649000 audit[4587]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fffe9e27850 a2=0 a3=7fffe9e2783c items=0 ppid=2242 pid=4587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:13.649000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:13.653000 audit[4587]: NETFILTER_CFG table=nat:127 family=2 entries=104 op=nft_register_chain pid=4587 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:13.653000 audit[4587]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7fffe9e27850 a2=0 a3=7fffe9e2783c items=0 ppid=2242 pid=4587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:13.653000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:18.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.97:22-147.75.109.163:41312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:18.076454 systemd[1]: Started sshd@24-10.128.0.97:22-147.75.109.163:41312.service. Feb 9 19:19:18.082207 kernel: kauditd_printk_skb: 31 callbacks suppressed Feb 9 19:19:18.082303 kernel: audit: type=1130 audit(1707506358.075:1568): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.97:22-147.75.109.163:41312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:18.362614 systemd[1]: run-containerd-runc-k8s.io-23d83520fc51c052f40ed4b42bbf5503e00251786ddbe5b7882056245b992956-runc.ZRkY91.mount: Deactivated successfully. Feb 9 19:19:18.378000 audit[4595]: USER_ACCT pid=4595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:18.381566 sshd[4595]: Accepted publickey for core from 147.75.109.163 port 41312 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:19:18.411520 kernel: audit: type=1101 audit(1707506358.378:1569): pid=4595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:18.410380 sshd[4595]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:18.408000 audit[4595]: CRED_ACQ pid=4595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:18.439958 kernel: audit: type=1103 audit(1707506358.408:1570): pid=4595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:18.459955 kernel: audit: type=1006 audit(1707506358.408:1571): pid=4595 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 19:19:18.464413 systemd-logind[1136]: New session 25 of user core. Feb 9 19:19:18.464536 systemd[1]: Started session-25.scope. Feb 9 19:19:18.408000 audit[4595]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6f5586a0 a2=3 a3=0 items=0 ppid=1 pid=4595 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:18.497113 kernel: audit: type=1300 audit(1707506358.408:1571): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6f5586a0 a2=3 a3=0 items=0 ppid=1 pid=4595 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:18.408000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:18.513980 kernel: audit: type=1327 audit(1707506358.408:1571): proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:18.514136 kernel: audit: type=1105 audit(1707506358.499:1572): pid=4595 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:18.499000 audit[4595]: USER_START pid=4595 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:18.503000 audit[4617]: CRED_ACQ pid=4617 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:18.569656 kernel: audit: type=1103 audit(1707506358.503:1573): pid=4617 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:18.798444 sshd[4595]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:18.799000 audit[4595]: USER_END pid=4595 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:18.803550 systemd[1]: sshd@24-10.128.0.97:22-147.75.109.163:41312.service: Deactivated successfully. Feb 9 19:19:18.804719 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 19:19:18.806734 systemd-logind[1136]: Session 25 logged out. Waiting for processes to exit. Feb 9 19:19:18.808496 systemd-logind[1136]: Removed session 25. Feb 9 19:19:18.799000 audit[4595]: CRED_DISP pid=4595 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:18.858053 kernel: audit: type=1106 audit(1707506358.799:1574): pid=4595 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:18.858247 kernel: audit: type=1104 audit(1707506358.799:1575): pid=4595 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:18.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.97:22-147.75.109.163:41312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:20.284291 systemd[1]: run-containerd-runc-k8s.io-c2fdf6cf7c6108010741b89298495bf493ef687fcd2848998964175dd3dcd160-runc.bamG2e.mount: Deactivated successfully. Feb 9 19:19:22.798004 systemd[1]: run-containerd-runc-k8s.io-23d83520fc51c052f40ed4b42bbf5503e00251786ddbe5b7882056245b992956-runc.qCOXPV.mount: Deactivated successfully. Feb 9 19:19:23.845776 systemd[1]: Started sshd@25-10.128.0.97:22-147.75.109.163:41316.service. Feb 9 19:19:23.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.97:22-147.75.109.163:41316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:23.851873 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:19:23.852015 kernel: audit: type=1130 audit(1707506363.845:1577): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.97:22-147.75.109.163:41316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:24.138000 audit[4674]: USER_ACCT pid=4674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:24.140139 sshd[4674]: Accepted publickey for core from 147.75.109.163 port 41316 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:19:24.170374 kernel: audit: type=1101 audit(1707506364.138:1578): pid=4674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:24.168000 audit[4674]: CRED_ACQ pid=4674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:24.171024 sshd[4674]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:24.182229 systemd[1]: Started session-26.scope. Feb 9 19:19:24.184253 systemd-logind[1136]: New session 26 of user core. Feb 9 19:19:24.196969 kernel: audit: type=1103 audit(1707506364.168:1579): pid=4674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:24.216972 kernel: audit: type=1006 audit(1707506364.169:1580): pid=4674 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 19:19:24.217111 kernel: audit: type=1300 audit(1707506364.169:1580): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0849d160 a2=3 a3=0 items=0 ppid=1 pid=4674 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:24.169000 audit[4674]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0849d160 a2=3 a3=0 items=0 ppid=1 pid=4674 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:24.169000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:24.254627 kernel: audit: type=1327 audit(1707506364.169:1580): proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:24.254760 kernel: audit: type=1105 audit(1707506364.192:1581): pid=4674 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:24.192000 audit[4674]: USER_START pid=4674 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:24.199000 audit[4676]: CRED_ACQ pid=4676 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:24.311993 kernel: audit: type=1103 audit(1707506364.199:1582): pid=4676 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:24.450995 sshd[4674]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:24.452000 audit[4674]: USER_END pid=4674 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:24.485967 kernel: audit: type=1106 audit(1707506364.452:1583): pid=4674 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:24.452000 audit[4674]: CRED_DISP pid=4674 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:24.488972 systemd[1]: sshd@25-10.128.0.97:22-147.75.109.163:41316.service: Deactivated successfully. Feb 9 19:19:24.490313 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 19:19:24.492727 systemd-logind[1136]: Session 26 logged out. Waiting for processes to exit. Feb 9 19:19:24.494367 systemd-logind[1136]: Removed session 26. Feb 9 19:19:24.510963 kernel: audit: type=1104 audit(1707506364.452:1584): pid=4674 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:24.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.97:22-147.75.109.163:41316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:26.639000 audit[4707]: NETFILTER_CFG table=filter:128 family=2 entries=9 op=nft_register_rule pid=4707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:26.639000 audit[4707]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc071dcf10 a2=0 a3=7ffc071dcefc items=0 ppid=2242 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:26.639000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:26.643000 audit[4707]: NETFILTER_CFG table=nat:129 family=2 entries=51 op=nft_register_chain pid=4707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:26.643000 audit[4707]: SYSCALL arch=c000003e syscall=46 success=yes exit=17716 a0=3 a1=7ffc071dcf10 a2=0 a3=7ffc071dcefc items=0 ppid=2242 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:26.643000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:26.748000 audit[4709]: NETFILTER_CFG table=filter:130 family=2 entries=8 op=nft_register_rule pid=4709 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:26.748000 audit[4709]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd7d80da60 a2=0 a3=7ffd7d80da4c items=0 ppid=2242 pid=4709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:26.748000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:26.753000 audit[4709]: NETFILTER_CFG table=nat:131 family=2 entries=58 op=nft_register_chain pid=4709 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:26.753000 audit[4709]: SYSCALL arch=c000003e syscall=46 success=yes exit=19604 a0=3 a1=7ffd7d80da60 a2=0 a3=7ffd7d80da4c items=0 ppid=2242 pid=4709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:26.753000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:26.913000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:26.913000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b32b60 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:19:26.913000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:19:26.915000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:26.915000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b32ba0 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:19:26.915000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:19:26.918000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:26.918000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bfc4a0 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:19:26.918000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:19:26.927000 audit[1974]: AVC avc: denied { watch } for pid=1974 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:26.927000 audit[1974]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b32de0 a2=fc6 a3=0 items=0 ppid=1834 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c475 key=(null) Feb 9 19:19:26.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:19:29.499199 systemd[1]: Started sshd@26-10.128.0.97:22-147.75.109.163:39048.service. Feb 9 19:19:29.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.128.0.97:22-147.75.109.163:39048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:29.505431 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 19:19:29.505533 kernel: audit: type=1130 audit(1707506369.498:1594): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.128.0.97:22-147.75.109.163:39048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:29.799000 audit[4711]: USER_ACCT pid=4711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:29.801957 sshd[4711]: Accepted publickey for core from 147.75.109.163 port 39048 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:19:29.830029 kernel: audit: type=1101 audit(1707506369.799:1595): pid=4711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:29.832485 sshd[4711]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:29.830000 audit[4711]: CRED_ACQ pid=4711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:29.859977 kernel: audit: type=1103 audit(1707506369.830:1596): pid=4711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:29.869533 systemd[1]: Started session-27.scope. Feb 9 19:19:29.871988 systemd-logind[1136]: New session 27 of user core. Feb 9 19:19:29.830000 audit[4711]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd567fcd30 a2=3 a3=0 items=0 ppid=1 pid=4711 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:29.904959 kernel: audit: type=1006 audit(1707506369.830:1597): pid=4711 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 19:19:29.905105 kernel: audit: type=1300 audit(1707506369.830:1597): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd567fcd30 a2=3 a3=0 items=0 ppid=1 pid=4711 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:29.907769 kernel: audit: type=1327 audit(1707506369.830:1597): proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:29.830000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:29.886000 audit[4711]: USER_START pid=4711 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:29.946973 kernel: audit: type=1105 audit(1707506369.886:1598): pid=4711 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:29.886000 audit[4714]: CRED_ACQ pid=4714 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:29.971754 kernel: audit: type=1103 audit(1707506369.886:1599): pid=4714 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:30.218585 sshd[4711]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:30.219000 audit[4711]: USER_END pid=4711 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:30.253964 kernel: audit: type=1106 audit(1707506370.219:1600): pid=4711 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:30.256687 systemd[1]: sshd@26-10.128.0.97:22-147.75.109.163:39048.service: Deactivated successfully. Feb 9 19:19:30.258318 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 19:19:30.259464 systemd-logind[1136]: Session 27 logged out. Waiting for processes to exit. Feb 9 19:19:30.261413 systemd-logind[1136]: Removed session 27. Feb 9 19:19:30.252000 audit[4711]: CRED_DISP pid=4711 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:30.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.128.0.97:22-147.75.109.163:39048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:30.287145 kernel: audit: type=1104 audit(1707506370.252:1601): pid=4711 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success'