Feb 9 19:26:48.089410 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 19:26:48.089451 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:26:48.089469 kernel: BIOS-provided physical RAM map: Feb 9 19:26:48.089481 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Feb 9 19:26:48.089492 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Feb 9 19:26:48.089505 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Feb 9 19:26:48.089524 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Feb 9 19:26:48.089537 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Feb 9 19:26:48.089550 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Feb 9 19:26:48.089562 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Feb 9 19:26:48.089575 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Feb 9 19:26:48.089588 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Feb 9 19:26:48.089602 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Feb 9 19:26:48.089616 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Feb 9 19:26:48.089637 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Feb 9 19:26:48.089653 kernel: NX (Execute Disable) protection: active Feb 9 19:26:48.089668 kernel: efi: EFI v2.70 by EDK II Feb 9 19:26:48.089682 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe379198 RNG=0xbfb73018 TPMEventLog=0xbe2bd018 Feb 9 19:26:48.089695 kernel: random: crng init done Feb 9 19:26:48.089710 kernel: SMBIOS 2.4 present. Feb 9 19:26:48.089724 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 Feb 9 19:26:48.089739 kernel: Hypervisor detected: KVM Feb 9 19:26:48.089755 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 19:26:48.089770 kernel: kvm-clock: cpu 0, msr 1e5faa001, primary cpu clock Feb 9 19:26:48.089783 kernel: kvm-clock: using sched offset of 12703537456 cycles Feb 9 19:26:48.089798 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 19:26:48.089812 kernel: tsc: Detected 2299.998 MHz processor Feb 9 19:26:48.089842 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 19:26:48.089859 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 19:26:48.089875 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Feb 9 19:26:48.089891 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 19:26:48.089906 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Feb 9 19:26:48.089924 kernel: Using GB pages for direct mapping Feb 9 19:26:48.089938 kernel: Secure boot disabled Feb 9 19:26:48.089952 kernel: ACPI: Early table checksum verification disabled Feb 9 19:26:48.089966 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Feb 9 19:26:48.089980 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Feb 9 19:26:48.089995 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Feb 9 19:26:48.090011 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Feb 9 19:26:48.090027 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Feb 9 19:26:48.090052 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Feb 9 19:26:48.090067 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Feb 9 19:26:48.092366 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Feb 9 19:26:48.092399 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Feb 9 19:26:48.092417 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Feb 9 19:26:48.092433 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Feb 9 19:26:48.092455 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Feb 9 19:26:48.092470 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Feb 9 19:26:48.092486 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Feb 9 19:26:48.092502 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Feb 9 19:26:48.092518 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Feb 9 19:26:48.092533 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Feb 9 19:26:48.092549 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Feb 9 19:26:48.092566 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Feb 9 19:26:48.092582 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Feb 9 19:26:48.092601 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 9 19:26:48.092616 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 9 19:26:48.092631 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 9 19:26:48.092647 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Feb 9 19:26:48.092662 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Feb 9 19:26:48.092677 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Feb 9 19:26:48.092692 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Feb 9 19:26:48.092707 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Feb 9 19:26:48.092724 kernel: Zone ranges: Feb 9 19:26:48.092746 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 19:26:48.092761 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 19:26:48.092787 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Feb 9 19:26:48.092801 kernel: Movable zone start for each node Feb 9 19:26:48.092816 kernel: Early memory node ranges Feb 9 19:26:48.092831 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Feb 9 19:26:48.092847 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Feb 9 19:26:48.092862 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Feb 9 19:26:48.092877 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Feb 9 19:26:48.092896 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Feb 9 19:26:48.092910 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Feb 9 19:26:48.092926 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:26:48.092943 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Feb 9 19:26:48.092959 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Feb 9 19:26:48.092976 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Feb 9 19:26:48.092992 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Feb 9 19:26:48.093008 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 9 19:26:48.093023 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 19:26:48.093042 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 19:26:48.093057 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 19:26:48.093073 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 19:26:48.093102 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 19:26:48.093118 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 19:26:48.093133 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 19:26:48.093158 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 19:26:48.093182 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Feb 9 19:26:48.093199 kernel: Booting paravirtualized kernel on KVM Feb 9 19:26:48.093220 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 19:26:48.093235 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 19:26:48.093250 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 19:26:48.093265 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 19:26:48.093280 kernel: pcpu-alloc: [0] 0 1 Feb 9 19:26:48.093295 kernel: kvm-guest: PV spinlocks enabled Feb 9 19:26:48.093309 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 19:26:48.093325 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Feb 9 19:26:48.093340 kernel: Policy zone: Normal Feb 9 19:26:48.093361 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:26:48.093378 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:26:48.093394 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 9 19:26:48.093410 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 19:26:48.093427 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:26:48.093444 kernel: Memory: 7536516K/7860584K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 323808K reserved, 0K cma-reserved) Feb 9 19:26:48.093461 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 19:26:48.093478 kernel: Kernel/User page tables isolation: enabled Feb 9 19:26:48.093497 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 19:26:48.093513 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 19:26:48.093530 kernel: rcu: Hierarchical RCU implementation. Feb 9 19:26:48.093547 kernel: rcu: RCU event tracing is enabled. Feb 9 19:26:48.093564 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 19:26:48.093581 kernel: Rude variant of Tasks RCU enabled. Feb 9 19:26:48.093598 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:26:48.093614 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:26:48.093631 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 19:26:48.093652 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 9 19:26:48.093680 kernel: Console: colour dummy device 80x25 Feb 9 19:26:48.093698 kernel: printk: console [ttyS0] enabled Feb 9 19:26:48.093718 kernel: ACPI: Core revision 20210730 Feb 9 19:26:48.093736 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 19:26:48.093753 kernel: x2apic enabled Feb 9 19:26:48.093770 kernel: Switched APIC routing to physical x2apic. Feb 9 19:26:48.093787 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Feb 9 19:26:48.093805 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 9 19:26:48.093823 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Feb 9 19:26:48.093845 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Feb 9 19:26:48.093862 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Feb 9 19:26:48.093880 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 19:26:48.093898 kernel: Spectre V2 : Mitigation: IBRS Feb 9 19:26:48.093915 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 19:26:48.093933 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 19:26:48.093953 kernel: RETBleed: Mitigation: IBRS Feb 9 19:26:48.093971 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 19:26:48.093988 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Feb 9 19:26:48.094006 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 19:26:48.094023 kernel: MDS: Mitigation: Clear CPU buffers Feb 9 19:26:48.094041 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 19:26:48.094058 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 19:26:48.094076 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 19:26:48.094125 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 19:26:48.094147 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 19:26:48.094164 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 9 19:26:48.094189 kernel: Freeing SMP alternatives memory: 32K Feb 9 19:26:48.094206 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:26:48.094224 kernel: LSM: Security Framework initializing Feb 9 19:26:48.094241 kernel: SELinux: Initializing. Feb 9 19:26:48.094258 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:26:48.094275 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:26:48.094292 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Feb 9 19:26:48.094314 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Feb 9 19:26:48.094332 kernel: signal: max sigframe size: 1776 Feb 9 19:26:48.094349 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:26:48.094367 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 9 19:26:48.094384 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:26:48.094401 kernel: x86: Booting SMP configuration: Feb 9 19:26:48.094418 kernel: .... node #0, CPUs: #1 Feb 9 19:26:48.094436 kernel: kvm-clock: cpu 1, msr 1e5faa041, secondary cpu clock Feb 9 19:26:48.094454 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 9 19:26:48.094476 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 19:26:48.094493 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 19:26:48.094511 kernel: smpboot: Max logical packages: 1 Feb 9 19:26:48.094529 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Feb 9 19:26:48.094546 kernel: devtmpfs: initialized Feb 9 19:26:48.094563 kernel: x86/mm: Memory block size: 128MB Feb 9 19:26:48.094582 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Feb 9 19:26:48.094600 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:26:48.094617 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 19:26:48.094638 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:26:48.094655 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:26:48.094673 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:26:48.094689 kernel: audit: type=2000 audit(1707506807.360:1): state=initialized audit_enabled=0 res=1 Feb 9 19:26:48.094706 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:26:48.094724 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 19:26:48.094741 kernel: cpuidle: using governor menu Feb 9 19:26:48.094758 kernel: ACPI: bus type PCI registered Feb 9 19:26:48.094776 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:26:48.094796 kernel: dca service started, version 1.12.1 Feb 9 19:26:48.094814 kernel: PCI: Using configuration type 1 for base access Feb 9 19:26:48.094832 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 19:26:48.094850 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 19:26:48.094867 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:26:48.094885 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:26:48.094902 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:26:48.094920 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:26:48.094937 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:26:48.094957 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:26:48.094975 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:26:48.094992 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:26:48.095010 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 9 19:26:48.095027 kernel: ACPI: Interpreter enabled Feb 9 19:26:48.095044 kernel: ACPI: PM: (supports S0 S3 S5) Feb 9 19:26:48.095061 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 19:26:48.095077 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 19:26:48.095133 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 9 19:26:48.095153 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 19:26:48.095383 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 9 19:26:48.095543 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 9 19:26:48.095565 kernel: PCI host bridge to bus 0000:00 Feb 9 19:26:48.095713 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 19:26:48.095853 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 19:26:48.095995 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 19:26:48.109260 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Feb 9 19:26:48.109436 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 19:26:48.109617 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 19:26:48.109792 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Feb 9 19:26:48.109961 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 19:26:48.110152 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 9 19:26:48.110342 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Feb 9 19:26:48.110507 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Feb 9 19:26:48.110670 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Feb 9 19:26:48.110854 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Feb 9 19:26:48.111017 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Feb 9 19:26:48.111227 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Feb 9 19:26:48.111403 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 19:26:48.111566 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Feb 9 19:26:48.111732 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Feb 9 19:26:48.111755 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 19:26:48.111774 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 19:26:48.111801 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 19:26:48.111819 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 19:26:48.111836 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 19:26:48.111859 kernel: iommu: Default domain type: Translated Feb 9 19:26:48.111877 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 19:26:48.111895 kernel: vgaarb: loaded Feb 9 19:26:48.111913 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:26:48.111931 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:26:48.111949 kernel: PTP clock support registered Feb 9 19:26:48.111966 kernel: Registered efivars operations Feb 9 19:26:48.111985 kernel: PCI: Using ACPI for IRQ routing Feb 9 19:26:48.112002 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 19:26:48.112023 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Feb 9 19:26:48.112041 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Feb 9 19:26:48.112058 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Feb 9 19:26:48.112075 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Feb 9 19:26:48.112111 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 19:26:48.112128 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:26:48.112145 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:26:48.112163 kernel: pnp: PnP ACPI init Feb 9 19:26:48.112187 kernel: pnp: PnP ACPI: found 7 devices Feb 9 19:26:48.112210 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 19:26:48.112228 kernel: NET: Registered PF_INET protocol family Feb 9 19:26:48.112246 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 19:26:48.112264 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 9 19:26:48.112282 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:26:48.112299 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 19:26:48.112317 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 19:26:48.112335 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 9 19:26:48.112353 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:26:48.112374 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:26:48.112399 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:26:48.112416 kernel: NET: Registered PF_XDP protocol family Feb 9 19:26:48.112568 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 19:26:48.112717 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 19:26:48.112862 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 19:26:48.113004 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Feb 9 19:26:48.113186 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 19:26:48.113214 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:26:48.113233 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 19:26:48.113251 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Feb 9 19:26:48.113268 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 9 19:26:48.113287 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 9 19:26:48.113304 kernel: clocksource: Switched to clocksource tsc Feb 9 19:26:48.113322 kernel: Initialise system trusted keyrings Feb 9 19:26:48.113339 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 9 19:26:48.113361 kernel: Key type asymmetric registered Feb 9 19:26:48.113378 kernel: Asymmetric key parser 'x509' registered Feb 9 19:26:48.113396 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:26:48.113414 kernel: io scheduler mq-deadline registered Feb 9 19:26:48.113431 kernel: io scheduler kyber registered Feb 9 19:26:48.113449 kernel: io scheduler bfq registered Feb 9 19:26:48.113466 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 19:26:48.113485 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 19:26:48.113653 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Feb 9 19:26:48.113681 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 9 19:26:48.113839 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Feb 9 19:26:48.113862 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 19:26:48.114022 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Feb 9 19:26:48.114045 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:26:48.114063 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 19:26:48.121062 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 19:26:48.121140 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Feb 9 19:26:48.121159 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Feb 9 19:26:48.121373 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Feb 9 19:26:48.121398 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 19:26:48.121417 kernel: i8042: Warning: Keylock active Feb 9 19:26:48.121434 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 19:26:48.121451 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 19:26:48.121613 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 9 19:26:48.121765 kernel: rtc_cmos 00:00: registered as rtc0 Feb 9 19:26:48.121916 kernel: rtc_cmos 00:00: setting system clock to 2024-02-09T19:26:47 UTC (1707506807) Feb 9 19:26:48.122059 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 9 19:26:48.122093 kernel: intel_pstate: CPU model not supported Feb 9 19:26:48.128226 kernel: pstore: Registered efi as persistent store backend Feb 9 19:26:48.128244 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:26:48.128261 kernel: Segment Routing with IPv6 Feb 9 19:26:48.128278 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:26:48.128295 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:26:48.128312 kernel: Key type dns_resolver registered Feb 9 19:26:48.128334 kernel: IPI shorthand broadcast: enabled Feb 9 19:26:48.128350 kernel: sched_clock: Marking stable (731322759, 144132003)->(908934728, -33479966) Feb 9 19:26:48.128367 kernel: registered taskstats version 1 Feb 9 19:26:48.128385 kernel: Loading compiled-in X.509 certificates Feb 9 19:26:48.128403 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 19:26:48.128422 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 19:26:48.128439 kernel: Key type .fscrypt registered Feb 9 19:26:48.128454 kernel: Key type fscrypt-provisioning registered Feb 9 19:26:48.128471 kernel: pstore: Using crash dump compression: deflate Feb 9 19:26:48.128492 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:26:48.128508 kernel: ima: No architecture policies found Feb 9 19:26:48.128524 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 19:26:48.128540 kernel: Write protecting the kernel read-only data: 28672k Feb 9 19:26:48.128556 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 19:26:48.128573 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 19:26:48.128590 kernel: Run /init as init process Feb 9 19:26:48.128607 kernel: with arguments: Feb 9 19:26:48.128629 kernel: /init Feb 9 19:26:48.128645 kernel: with environment: Feb 9 19:26:48.128662 kernel: HOME=/ Feb 9 19:26:48.128678 kernel: TERM=linux Feb 9 19:26:48.128695 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:26:48.128717 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:26:48.128740 systemd[1]: Detected virtualization kvm. Feb 9 19:26:48.128759 systemd[1]: Detected architecture x86-64. Feb 9 19:26:48.128781 systemd[1]: Running in initrd. Feb 9 19:26:48.128799 systemd[1]: No hostname configured, using default hostname. Feb 9 19:26:48.128817 systemd[1]: Hostname set to . Feb 9 19:26:48.128836 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:26:48.128860 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:26:48.128879 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:26:48.128897 systemd[1]: Reached target cryptsetup.target. Feb 9 19:26:48.128914 systemd[1]: Reached target paths.target. Feb 9 19:26:48.128935 systemd[1]: Reached target slices.target. Feb 9 19:26:48.128953 systemd[1]: Reached target swap.target. Feb 9 19:26:48.128971 systemd[1]: Reached target timers.target. Feb 9 19:26:48.128991 systemd[1]: Listening on iscsid.socket. Feb 9 19:26:48.129010 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:26:48.129029 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:26:48.129048 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:26:48.129070 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:26:48.129103 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:26:48.129122 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:26:48.129141 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:26:48.129159 systemd[1]: Reached target sockets.target. Feb 9 19:26:48.129184 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:26:48.129203 systemd[1]: Finished network-cleanup.service. Feb 9 19:26:48.129222 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:26:48.129240 systemd[1]: Starting systemd-journald.service... Feb 9 19:26:48.129263 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:26:48.129282 systemd[1]: Starting systemd-resolved.service... Feb 9 19:26:48.129301 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:26:48.129339 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:26:48.129362 kernel: audit: type=1130 audit(1707506808.102:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.129381 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:26:48.129401 kernel: audit: type=1130 audit(1707506808.113:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.129424 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:26:48.129444 kernel: audit: type=1130 audit(1707506808.121:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.129463 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:26:48.129488 systemd-journald[190]: Journal started Feb 9 19:26:48.129582 systemd-journald[190]: Runtime Journal (/run/log/journal/493bc8a8cead7e0c7c964d7b46be5442) is 8.0M, max 148.8M, 140.8M free. Feb 9 19:26:48.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.125446 systemd-modules-load[191]: Inserted module 'overlay' Feb 9 19:26:48.146008 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:26:48.146061 systemd[1]: Started systemd-journald.service. Feb 9 19:26:48.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.150115 kernel: audit: type=1130 audit(1707506808.145:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.162017 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:26:48.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.170107 kernel: audit: type=1130 audit(1707506808.161:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.180883 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:26:48.195230 kernel: audit: type=1130 audit(1707506808.181:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.184358 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:26:48.198326 systemd-resolved[192]: Positive Trust Anchors: Feb 9 19:26:48.205213 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:26:48.198340 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:26:48.198405 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:26:48.220198 kernel: Bridge firewalling registered Feb 9 19:26:48.220235 dracut-cmdline[205]: dracut-dracut-053 Feb 9 19:26:48.220235 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:26:48.240715 kernel: audit: type=1130 audit(1707506808.225:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.203741 systemd-resolved[192]: Defaulting to hostname 'linux'. Feb 9 19:26:48.205681 systemd[1]: Started systemd-resolved.service. Feb 9 19:26:48.210486 systemd-modules-load[191]: Inserted module 'br_netfilter' Feb 9 19:26:48.250191 kernel: SCSI subsystem initialized Feb 9 19:26:48.230750 systemd[1]: Reached target nss-lookup.target. Feb 9 19:26:48.266927 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:26:48.266985 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:26:48.270107 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:26:48.274228 systemd-modules-load[191]: Inserted module 'dm_multipath' Feb 9 19:26:48.275219 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:26:48.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.293139 kernel: audit: type=1130 audit(1707506808.286:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.288475 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:26:48.308448 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:26:48.316203 kernel: audit: type=1130 audit(1707506808.308:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.324108 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:26:48.337109 kernel: iscsi: registered transport (tcp) Feb 9 19:26:48.361544 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:26:48.361616 kernel: QLogic iSCSI HBA Driver Feb 9 19:26:48.406091 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:26:48.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.412508 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:26:48.469144 kernel: raid6: avx2x4 gen() 18193 MB/s Feb 9 19:26:48.486137 kernel: raid6: avx2x4 xor() 7993 MB/s Feb 9 19:26:48.503139 kernel: raid6: avx2x2 gen() 18117 MB/s Feb 9 19:26:48.520126 kernel: raid6: avx2x2 xor() 18568 MB/s Feb 9 19:26:48.537133 kernel: raid6: avx2x1 gen() 14106 MB/s Feb 9 19:26:48.554112 kernel: raid6: avx2x1 xor() 16150 MB/s Feb 9 19:26:48.571159 kernel: raid6: sse2x4 gen() 10998 MB/s Feb 9 19:26:48.588125 kernel: raid6: sse2x4 xor() 6628 MB/s Feb 9 19:26:48.605122 kernel: raid6: sse2x2 gen() 12011 MB/s Feb 9 19:26:48.622120 kernel: raid6: sse2x2 xor() 7428 MB/s Feb 9 19:26:48.640160 kernel: raid6: sse2x1 gen() 10464 MB/s Feb 9 19:26:48.658016 kernel: raid6: sse2x1 xor() 5100 MB/s Feb 9 19:26:48.658143 kernel: raid6: using algorithm avx2x4 gen() 18193 MB/s Feb 9 19:26:48.658182 kernel: raid6: .... xor() 7993 MB/s, rmw enabled Feb 9 19:26:48.659013 kernel: raid6: using avx2x2 recovery algorithm Feb 9 19:26:48.674122 kernel: xor: automatically using best checksumming function avx Feb 9 19:26:48.780123 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 19:26:48.792193 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:26:48.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.796000 audit: BPF prog-id=7 op=LOAD Feb 9 19:26:48.796000 audit: BPF prog-id=8 op=LOAD Feb 9 19:26:48.798730 systemd[1]: Starting systemd-udevd.service... Feb 9 19:26:48.816181 systemd-udevd[388]: Using default interface naming scheme 'v252'. Feb 9 19:26:48.823582 systemd[1]: Started systemd-udevd.service. Feb 9 19:26:48.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.828547 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:26:48.850604 dracut-pre-trigger[395]: rd.md=0: removing MD RAID activation Feb 9 19:26:48.893014 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:26:48.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:48.900512 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:26:48.973093 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:26:48.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:49.063191 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 19:26:49.101110 kernel: scsi host0: Virtio SCSI HBA Feb 9 19:26:49.136111 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Feb 9 19:26:49.136222 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 19:26:49.137919 kernel: AES CTR mode by8 optimization enabled Feb 9 19:26:49.200272 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Feb 9 19:26:49.200624 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Feb 9 19:26:49.200870 kernel: sd 0:0:1:0: [sda] Write Protect is off Feb 9 19:26:49.201327 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Feb 9 19:26:49.201593 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 19:26:49.211699 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 19:26:49.211769 kernel: GPT:17805311 != 25165823 Feb 9 19:26:49.211791 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 19:26:49.212958 kernel: GPT:17805311 != 25165823 Feb 9 19:26:49.213666 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 19:26:49.215360 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:26:49.218104 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Feb 9 19:26:49.269109 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (447) Feb 9 19:26:49.276794 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:26:49.294307 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:26:49.304721 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:26:49.310065 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:26:49.316196 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:26:49.318702 systemd[1]: Starting disk-uuid.service... Feb 9 19:26:49.329047 disk-uuid[513]: Primary Header is updated. Feb 9 19:26:49.329047 disk-uuid[513]: Secondary Entries is updated. Feb 9 19:26:49.329047 disk-uuid[513]: Secondary Header is updated. Feb 9 19:26:49.343206 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:26:49.359113 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:26:49.367117 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:26:50.370120 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:26:50.370198 disk-uuid[514]: The operation has completed successfully. Feb 9 19:26:50.442866 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:26:50.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:50.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:50.442993 systemd[1]: Finished disk-uuid.service. Feb 9 19:26:50.481202 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 19:26:50.449240 systemd[1]: Starting verity-setup.service... Feb 9 19:26:50.555113 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:26:50.563576 systemd[1]: Finished verity-setup.service. Feb 9 19:26:50.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:50.571425 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:26:50.673186 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:26:50.673237 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:26:50.673620 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:26:50.718365 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:26:50.718430 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:26:50.718446 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:26:50.674580 systemd[1]: Starting ignition-setup.service... Feb 9 19:26:50.740380 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:26:50.733904 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:26:50.763456 systemd[1]: Finished ignition-setup.service. Feb 9 19:26:50.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:50.773286 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:26:50.846460 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:26:50.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:50.856000 audit: BPF prog-id=9 op=LOAD Feb 9 19:26:50.858710 systemd[1]: Starting systemd-networkd.service... Feb 9 19:26:50.893836 systemd-networkd[688]: lo: Link UP Feb 9 19:26:50.893850 systemd-networkd[688]: lo: Gained carrier Feb 9 19:26:50.895351 systemd-networkd[688]: Enumeration completed Feb 9 19:26:50.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:50.895496 systemd[1]: Started systemd-networkd.service. Feb 9 19:26:50.896160 systemd-networkd[688]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:26:50.898757 systemd-networkd[688]: eth0: Link UP Feb 9 19:26:50.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:50.898766 systemd-networkd[688]: eth0: Gained carrier Feb 9 19:26:50.912224 systemd-networkd[688]: eth0: DHCPv4 address 10.128.0.111/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 9 19:26:50.989268 iscsid[697]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:26:50.989268 iscsid[697]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 19:26:50.989268 iscsid[697]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:26:50.989268 iscsid[697]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:26:50.989268 iscsid[697]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:26:50.989268 iscsid[697]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:26:50.989268 iscsid[697]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:26:51.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:50.915385 systemd[1]: Reached target network.target. Feb 9 19:26:51.074964 ignition[612]: Ignition 2.14.0 Feb 9 19:26:51.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:50.936313 systemd[1]: Starting iscsiuio.service... Feb 9 19:26:51.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:51.074978 ignition[612]: Stage: fetch-offline Feb 9 19:26:50.945219 systemd[1]: Started iscsiuio.service. Feb 9 19:26:51.075058 ignition[612]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:26:50.963963 systemd[1]: Starting iscsid.service... Feb 9 19:26:51.075136 ignition[612]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:26:51.006421 systemd[1]: Started iscsid.service. Feb 9 19:26:51.098431 ignition[612]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:26:51.059854 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:26:51.098633 ignition[612]: parsed url from cmdline: "" Feb 9 19:26:51.107596 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:26:51.098639 ignition[612]: no config URL provided Feb 9 19:26:51.122601 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:26:51.098646 ignition[612]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:26:51.136501 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:26:51.098657 ignition[612]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:26:51.152332 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:26:51.098666 ignition[612]: failed to fetch config: resource requires networking Feb 9 19:26:51.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:51.159393 systemd[1]: Reached target remote-fs.target. Feb 9 19:26:51.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:51.099073 ignition[612]: Ignition finished successfully Feb 9 19:26:51.182423 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:26:51.217907 ignition[712]: Ignition 2.14.0 Feb 9 19:26:51.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:51.207416 systemd[1]: Starting ignition-fetch.service... Feb 9 19:26:51.217914 ignition[712]: Stage: fetch Feb 9 19:26:51.274393 unknown[712]: fetched base config from "system" Feb 9 19:26:51.218046 ignition[712]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:26:51.274405 unknown[712]: fetched base config from "system" Feb 9 19:26:51.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:51.218077 ignition[712]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:26:51.274416 unknown[712]: fetched user config from "gcp" Feb 9 19:26:51.225681 ignition[712]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:26:51.287752 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:26:51.225988 ignition[712]: parsed url from cmdline: "" Feb 9 19:26:51.303578 systemd[1]: Finished ignition-fetch.service. Feb 9 19:26:51.225996 ignition[712]: no config URL provided Feb 9 19:26:51.322486 systemd[1]: Starting ignition-kargs.service... Feb 9 19:26:51.226006 ignition[712]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:26:51.345125 systemd[1]: Finished ignition-kargs.service. Feb 9 19:26:51.226017 ignition[712]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:26:51.359308 systemd[1]: Starting ignition-disks.service... Feb 9 19:26:51.226051 ignition[712]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Feb 9 19:26:51.391687 systemd[1]: Finished ignition-disks.service. Feb 9 19:26:51.233035 ignition[712]: GET result: OK Feb 9 19:26:51.409477 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:26:51.233205 ignition[712]: parsing config with SHA512: 163dc4ba752fe99555643ea8bffec50012e617befef44a4e9d1b8a35f4138ff0ccf367fadb00e119efed5b50c6bb199a66a1a64d0b18f30aaa1373c82a4c21a8 Feb 9 19:26:51.425218 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:26:51.275335 ignition[712]: fetch: fetch complete Feb 9 19:26:51.437194 systemd[1]: Reached target local-fs.target. Feb 9 19:26:51.275341 ignition[712]: fetch: fetch passed Feb 9 19:26:51.452184 systemd[1]: Reached target sysinit.target. Feb 9 19:26:51.275397 ignition[712]: Ignition finished successfully Feb 9 19:26:51.464205 systemd[1]: Reached target basic.target. Feb 9 19:26:51.334962 ignition[718]: Ignition 2.14.0 Feb 9 19:26:51.478577 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:26:51.334971 ignition[718]: Stage: kargs Feb 9 19:26:51.335135 ignition[718]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:26:51.335192 ignition[718]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:26:51.342650 ignition[718]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:26:51.344157 ignition[718]: kargs: kargs passed Feb 9 19:26:51.344206 ignition[718]: Ignition finished successfully Feb 9 19:26:51.370132 ignition[724]: Ignition 2.14.0 Feb 9 19:26:51.370142 ignition[724]: Stage: disks Feb 9 19:26:51.370273 ignition[724]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:26:51.370306 ignition[724]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:26:51.377910 ignition[724]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:26:51.379554 ignition[724]: disks: disks passed Feb 9 19:26:51.379602 ignition[724]: Ignition finished successfully Feb 9 19:26:51.516551 systemd-fsck[732]: ROOT: clean, 602/1628000 files, 124051/1617920 blocks Feb 9 19:26:51.670041 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:26:51.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:51.671297 systemd[1]: Mounting sysroot.mount... Feb 9 19:26:51.708266 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:26:51.702542 systemd[1]: Mounted sysroot.mount. Feb 9 19:26:51.715638 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:26:51.735165 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:26:51.746989 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 19:26:51.747054 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:26:51.747171 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:26:51.841344 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (738) Feb 9 19:26:51.841382 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:26:51.841397 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:26:51.841411 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:26:51.764626 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:26:51.789534 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:26:51.870279 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:26:51.870317 initrd-setup-root[759]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:26:51.833575 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:26:51.896255 initrd-setup-root[767]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:26:51.872198 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:26:51.916265 initrd-setup-root[775]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:26:51.926190 initrd-setup-root[785]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:26:51.936528 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:26:51.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:51.946287 systemd[1]: Starting ignition-mount.service... Feb 9 19:26:51.967092 systemd[1]: Starting sysroot-boot.service... Feb 9 19:26:51.975180 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 19:26:51.975283 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 19:26:52.001405 ignition[803]: INFO : Ignition 2.14.0 Feb 9 19:26:52.001405 ignition[803]: INFO : Stage: mount Feb 9 19:26:52.001405 ignition[803]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:26:52.001405 ignition[803]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:26:52.094242 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (813) Feb 9 19:26:52.094283 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:26:52.094306 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:26:52.094346 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:26:52.094368 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:26:52.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:52.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:52.094518 ignition[803]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:26:52.094518 ignition[803]: INFO : mount: mount passed Feb 9 19:26:52.094518 ignition[803]: INFO : Ignition finished successfully Feb 9 19:26:52.006596 systemd[1]: Finished sysroot-boot.service. Feb 9 19:26:52.016515 systemd[1]: Finished ignition-mount.service. Feb 9 19:26:52.032278 systemd[1]: Starting ignition-files.service... Feb 9 19:26:52.046117 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:26:52.170290 ignition[832]: INFO : Ignition 2.14.0 Feb 9 19:26:52.170290 ignition[832]: INFO : Stage: files Feb 9 19:26:52.170290 ignition[832]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:26:52.170290 ignition[832]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:26:52.170290 ignition[832]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:26:52.170290 ignition[832]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:26:52.170290 ignition[832]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:26:52.170290 ignition[832]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:26:52.170290 ignition[832]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:26:52.170290 ignition[832]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:26:52.170290 ignition[832]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:26:52.047311 systemd-networkd[688]: eth0: Gained IPv6LL Feb 9 19:26:52.306209 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:26:52.306209 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 19:26:52.114407 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:26:52.168492 unknown[832]: wrote ssh authorized keys file for user: core Feb 9 19:26:52.463203 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 19:26:52.732884 ignition[832]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 19:26:52.758259 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:26:52.758259 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:26:52.758259 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 19:26:52.834740 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 19:26:52.945332 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:26:52.972236 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (835) Feb 9 19:26:52.972274 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/hosts" Feb 9 19:26:52.972274 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:26:52.972274 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem268063095" Feb 9 19:26:52.972274 ignition[832]: CRITICAL : files: createFilesystemsFiles: createFiles: op(5): op(6): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem268063095": device or resource busy Feb 9 19:26:52.972274 ignition[832]: ERROR : files: createFilesystemsFiles: createFiles: op(5): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem268063095", trying btrfs: device or resource busy Feb 9 19:26:52.972274 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem268063095" Feb 9 19:26:52.972274 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem268063095" Feb 9 19:26:52.972274 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [started] unmounting "/mnt/oem268063095" Feb 9 19:26:52.972274 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [finished] unmounting "/mnt/oem268063095" Feb 9 19:26:52.972274 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/hosts" Feb 9 19:26:52.972274 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:26:52.972274 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 19:26:53.171266 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET result: OK Feb 9 19:26:52.974246 systemd[1]: mnt-oem268063095.mount: Deactivated successfully. Feb 9 19:26:53.260640 ignition[832]: DEBUG : files: createFilesystemsFiles: createFiles: op(9): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 19:26:53.284239 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:26:53.284239 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:26:53.284239 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Feb 9 19:26:53.332869 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Feb 9 19:26:53.616280 ignition[832]: DEBUG : files: createFilesystemsFiles: createFiles: op(a): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Feb 9 19:26:53.640222 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:26:53.640222 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 9 19:26:53.640222 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:26:53.640222 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4216832208" Feb 9 19:26:53.640222 ignition[832]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4216832208": device or resource busy Feb 9 19:26:53.640222 ignition[832]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4216832208", trying btrfs: device or resource busy Feb 9 19:26:53.640222 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4216832208" Feb 9 19:26:53.640222 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4216832208" Feb 9 19:26:53.640222 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem4216832208" Feb 9 19:26:53.640222 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem4216832208" Feb 9 19:26:53.640222 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 9 19:26:53.640222 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:26:53.640222 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 9 19:26:53.630398 systemd[1]: mnt-oem4216832208.mount: Deactivated successfully. Feb 9 19:26:53.868329 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET result: OK Feb 9 19:26:53.903142 ignition[832]: DEBUG : files: createFilesystemsFiles: createFiles: op(f): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 9 19:26:53.927301 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:26:53.927301 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:26:53.927301 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 9 19:26:53.927301 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET result: OK Feb 9 19:26:54.409835 ignition[832]: DEBUG : files: createFilesystemsFiles: createFiles: op(10): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 9 19:26:54.434230 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:26:54.434230 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:26:54.434230 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:26:54.434230 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:26:54.434230 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:26:54.434230 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:26:54.434230 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:26:54.434230 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(14): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:26:54.434230 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(14): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:26:54.434230 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(15): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:26:54.434230 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(15): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:26:54.434230 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:26:54.434230 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:26:54.434230 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(17): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 9 19:26:54.434230 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(17): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:26:54.434230 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem906571128" Feb 9 19:26:54.879251 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 19:26:54.879300 kernel: audit: type=1130 audit(1707506814.463:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.879327 kernel: audit: type=1130 audit(1707506814.552:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.879350 kernel: audit: type=1130 audit(1707506814.617:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.879367 kernel: audit: type=1131 audit(1707506814.617:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.879381 kernel: audit: type=1130 audit(1707506814.720:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.879395 kernel: audit: type=1131 audit(1707506814.720:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.428715 systemd[1]: mnt-oem906571128.mount: Deactivated successfully. Feb 9 19:26:54.917255 kernel: audit: type=1130 audit(1707506814.886:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.917369 ignition[832]: CRITICAL : files: createFilesystemsFiles: createFiles: op(17): op(18): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem906571128": device or resource busy Feb 9 19:26:54.917369 ignition[832]: ERROR : files: createFilesystemsFiles: createFiles: op(17): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem906571128", trying btrfs: device or resource busy Feb 9 19:26:54.917369 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem906571128" Feb 9 19:26:54.917369 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem906571128" Feb 9 19:26:54.917369 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [started] unmounting "/mnt/oem906571128" Feb 9 19:26:54.917369 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [finished] unmounting "/mnt/oem906571128" Feb 9 19:26:54.917369 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(17): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 9 19:26:54.917369 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 9 19:26:54.917369 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(1b): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:26:54.917369 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1966897095" Feb 9 19:26:54.917369 ignition[832]: CRITICAL : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1966897095": device or resource busy Feb 9 19:26:54.917369 ignition[832]: ERROR : files: createFilesystemsFiles: createFiles: op(1b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1966897095", trying btrfs: device or resource busy Feb 9 19:26:54.917369 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1966897095" Feb 9 19:26:54.917369 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1966897095" Feb 9 19:26:55.236292 kernel: audit: type=1131 audit(1707506815.065:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.452370 systemd[1]: mnt-oem1966897095.mount: Deactivated successfully. Feb 9 19:26:55.253270 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [started] unmounting "/mnt/oem1966897095" Feb 9 19:26:55.253270 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [finished] unmounting "/mnt/oem1966897095" Feb 9 19:26:55.253270 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 9 19:26:55.253270 ignition[832]: INFO : files: op(1f): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:26:55.253270 ignition[832]: INFO : files: op(1f): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:26:55.253270 ignition[832]: INFO : files: op(20): [started] processing unit "oem-gce.service" Feb 9 19:26:55.253270 ignition[832]: INFO : files: op(20): [finished] processing unit "oem-gce.service" Feb 9 19:26:55.253270 ignition[832]: INFO : files: op(21): [started] processing unit "oem-gce-enable-oslogin.service" Feb 9 19:26:55.253270 ignition[832]: INFO : files: op(21): [finished] processing unit "oem-gce-enable-oslogin.service" Feb 9 19:26:55.253270 ignition[832]: INFO : files: op(22): [started] processing unit "prepare-helm.service" Feb 9 19:26:55.253270 ignition[832]: INFO : files: op(22): op(23): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:26:55.253270 ignition[832]: INFO : files: op(22): op(23): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:26:55.253270 ignition[832]: INFO : files: op(22): [finished] processing unit "prepare-helm.service" Feb 9 19:26:55.253270 ignition[832]: INFO : files: op(24): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:26:55.253270 ignition[832]: INFO : files: op(24): op(25): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:26:55.253270 ignition[832]: INFO : files: op(24): op(25): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:26:55.253270 ignition[832]: INFO : files: op(24): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:26:55.253270 ignition[832]: INFO : files: op(26): [started] processing unit "prepare-critools.service" Feb 9 19:26:55.253270 ignition[832]: INFO : files: op(26): op(27): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:26:55.631375 kernel: audit: type=1131 audit(1707506815.412:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.631420 kernel: audit: type=1131 audit(1707506815.507:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.463133 systemd[1]: Finished ignition-files.service. Feb 9 19:26:55.646296 ignition[832]: INFO : files: op(26): op(27): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:26:55.646296 ignition[832]: INFO : files: op(26): [finished] processing unit "prepare-critools.service" Feb 9 19:26:55.646296 ignition[832]: INFO : files: op(28): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:26:55.646296 ignition[832]: INFO : files: op(28): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:26:55.646296 ignition[832]: INFO : files: op(29): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:26:55.646296 ignition[832]: INFO : files: op(29): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:26:55.646296 ignition[832]: INFO : files: op(2a): [started] setting preset to enabled for "oem-gce.service" Feb 9 19:26:55.646296 ignition[832]: INFO : files: op(2a): [finished] setting preset to enabled for "oem-gce.service" Feb 9 19:26:55.646296 ignition[832]: INFO : files: op(2b): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 9 19:26:55.646296 ignition[832]: INFO : files: op(2b): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 9 19:26:55.646296 ignition[832]: INFO : files: op(2c): [started] setting preset to enabled for "prepare-helm.service" Feb 9 19:26:55.646296 ignition[832]: INFO : files: op(2c): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 19:26:55.646296 ignition[832]: INFO : files: op(2d): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:26:55.646296 ignition[832]: INFO : files: op(2d): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:26:55.646296 ignition[832]: INFO : files: createResultFile: createFiles: op(2e): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:26:55.646296 ignition[832]: INFO : files: createResultFile: createFiles: op(2e): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:26:55.646296 ignition[832]: INFO : files: files passed Feb 9 19:26:55.646296 ignition[832]: INFO : Ignition finished successfully Feb 9 19:26:55.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.951704 initrd-setup-root-after-ignition[855]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:26:55.979403 iscsid[697]: iscsid shutting down. Feb 9 19:26:54.474824 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:26:54.510460 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:26:56.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.511665 systemd[1]: Starting ignition-quench.service... Feb 9 19:26:56.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.532749 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:26:54.553815 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:26:56.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.553955 systemd[1]: Finished ignition-quench.service. Feb 9 19:26:56.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:56.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.618526 systemd[1]: Reached target ignition-complete.target. Feb 9 19:26:56.115293 ignition[870]: INFO : Ignition 2.14.0 Feb 9 19:26:56.115293 ignition[870]: INFO : Stage: umount Feb 9 19:26:56.115293 ignition[870]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:26:56.115293 ignition[870]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:26:56.115293 ignition[870]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:26:56.115293 ignition[870]: INFO : umount: umount passed Feb 9 19:26:56.115293 ignition[870]: INFO : Ignition finished successfully Feb 9 19:26:56.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:56.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.683387 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:26:54.717978 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:26:56.245000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:26:56.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.718110 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:26:56.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.721573 systemd[1]: Reached target initrd-fs.target. Feb 9 19:26:56.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.803377 systemd[1]: Reached target initrd.target. Feb 9 19:26:54.840433 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:26:56.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.841620 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:26:54.857665 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:26:54.888715 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:26:56.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.932654 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:26:56.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.943529 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:26:56.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:54.993563 systemd[1]: Stopped target timers.target. Feb 9 19:26:55.030517 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:26:55.030724 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:26:56.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.066793 systemd[1]: Stopped target initrd.target. Feb 9 19:26:56.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.105607 systemd[1]: Stopped target basic.target. Feb 9 19:26:56.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.149576 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:26:56.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.168599 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:26:56.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:56.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:26:55.219563 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:26:55.244533 systemd[1]: Stopped target remote-fs.target. Feb 9 19:26:55.253584 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:26:55.274629 systemd[1]: Stopped target sysinit.target. Feb 9 19:26:55.319554 systemd[1]: Stopped target local-fs.target. Feb 9 19:26:56.569392 systemd-journald[190]: Received SIGTERM from PID 1 (n/a). Feb 9 19:26:55.350547 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:26:55.361574 systemd[1]: Stopped target swap.target. Feb 9 19:26:55.398512 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:26:55.398722 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:26:55.413843 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:26:55.474510 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:26:55.474710 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:26:55.508724 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:26:55.509016 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:26:55.566637 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:26:55.566816 systemd[1]: Stopped ignition-files.service. Feb 9 19:26:55.603839 systemd[1]: Stopping ignition-mount.service... Feb 9 19:26:55.638583 systemd[1]: Stopping iscsid.service... Feb 9 19:26:55.647610 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:26:55.667466 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:26:55.667706 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:26:55.693667 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:26:55.693847 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:26:55.710553 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:26:55.711418 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:26:55.711534 systemd[1]: Stopped iscsid.service. Feb 9 19:26:55.727198 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:26:55.727315 systemd[1]: Stopped ignition-mount.service. Feb 9 19:26:55.763872 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:26:55.764004 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:26:55.777025 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:26:55.777238 systemd[1]: Stopped ignition-disks.service. Feb 9 19:26:55.794635 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:26:55.794710 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:26:55.834520 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 19:26:55.834589 systemd[1]: Stopped ignition-fetch.service. Feb 9 19:26:55.865475 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:26:55.865564 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:26:55.878611 systemd[1]: Stopped target paths.target. Feb 9 19:26:55.922290 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:26:55.922540 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:26:55.937454 systemd[1]: Stopped target slices.target. Feb 9 19:26:55.965345 systemd[1]: Stopped target sockets.target. Feb 9 19:26:55.987382 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:26:55.987441 systemd[1]: Closed iscsid.socket. Feb 9 19:26:56.001369 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:26:56.001441 systemd[1]: Stopped ignition-setup.service. Feb 9 19:26:56.019420 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:26:56.019488 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:26:56.044533 systemd[1]: Stopping iscsiuio.service... Feb 9 19:26:56.058734 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:26:56.058848 systemd[1]: Stopped iscsiuio.service. Feb 9 19:26:56.074761 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:26:56.074903 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:26:56.092502 systemd[1]: Stopped target network.target. Feb 9 19:26:56.107360 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:26:56.107418 systemd[1]: Closed iscsiuio.socket. Feb 9 19:26:56.122442 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:26:56.126136 systemd-networkd[688]: eth0: DHCPv6 lease lost Feb 9 19:26:56.137391 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:26:56.161650 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:26:56.161785 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:26:56.189936 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:26:56.190060 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:26:56.208915 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:26:56.208965 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:26:56.216421 systemd[1]: Stopping network-cleanup.service... Feb 9 19:26:56.237227 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:26:56.237343 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:26:56.254341 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:26:56.254413 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:26:56.270435 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:26:56.270495 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:26:56.285550 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:26:56.300725 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 19:26:56.301461 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:26:56.301617 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:26:56.315809 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:26:56.315890 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:26:56.333358 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:26:56.333407 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:26:56.350274 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:26:56.350364 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:26:56.365399 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:26:56.365473 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:26:56.380396 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:26:56.380477 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:26:56.398416 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:26:56.422259 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 19:26:56.422394 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 19:26:56.580000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:26:56.439557 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:26:56.439636 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:26:56.455385 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:26:56.455466 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:26:56.471655 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 19:26:56.472356 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:26:56.472468 systemd[1]: Stopped network-cleanup.service. Feb 9 19:26:56.485632 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:26:56.485743 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:26:56.501499 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:26:56.519467 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:26:56.536656 systemd[1]: Switching root. Feb 9 19:26:56.581936 systemd-journald[190]: Journal stopped Feb 9 19:27:01.241400 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:27:01.241512 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:27:01.241544 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:27:01.241569 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:27:01.241592 kernel: SELinux: policy capability open_perms=1 Feb 9 19:27:01.241615 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:27:01.241649 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:27:01.241671 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:27:01.241694 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:27:01.241722 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:27:01.241744 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:27:01.241769 systemd[1]: Successfully loaded SELinux policy in 110.721ms. Feb 9 19:27:01.241841 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.854ms. Feb 9 19:27:01.241870 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:27:01.241896 systemd[1]: Detected virtualization kvm. Feb 9 19:27:01.241929 systemd[1]: Detected architecture x86-64. Feb 9 19:27:01.241955 systemd[1]: Detected first boot. Feb 9 19:27:01.241980 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:27:01.242007 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:27:01.242029 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:27:01.242052 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:27:01.242108 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:27:01.242138 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:27:01.242168 kernel: kauditd_printk_skb: 49 callbacks suppressed Feb 9 19:27:01.242199 kernel: audit: type=1334 audit(1707506820.356:89): prog-id=12 op=LOAD Feb 9 19:27:01.242220 kernel: audit: type=1334 audit(1707506820.356:90): prog-id=3 op=UNLOAD Feb 9 19:27:01.242239 kernel: audit: type=1334 audit(1707506820.369:91): prog-id=13 op=LOAD Feb 9 19:27:01.242259 kernel: audit: type=1334 audit(1707506820.384:92): prog-id=14 op=LOAD Feb 9 19:27:01.242279 kernel: audit: type=1334 audit(1707506820.384:93): prog-id=4 op=UNLOAD Feb 9 19:27:01.242301 kernel: audit: type=1334 audit(1707506820.384:94): prog-id=5 op=UNLOAD Feb 9 19:27:01.242326 kernel: audit: type=1334 audit(1707506820.390:95): prog-id=15 op=LOAD Feb 9 19:27:01.242344 kernel: audit: type=1334 audit(1707506820.390:96): prog-id=12 op=UNLOAD Feb 9 19:27:01.242364 kernel: audit: type=1334 audit(1707506820.398:97): prog-id=16 op=LOAD Feb 9 19:27:01.242384 kernel: audit: type=1334 audit(1707506820.412:98): prog-id=17 op=LOAD Feb 9 19:27:01.242405 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:27:01.242429 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:27:01.242452 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:27:01.242477 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:27:01.242500 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:27:01.242530 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 19:27:01.242553 systemd[1]: Created slice system-getty.slice. Feb 9 19:27:01.242576 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:27:01.242599 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:27:01.242622 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:27:01.242644 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:27:01.242670 systemd[1]: Created slice user.slice. Feb 9 19:27:01.242696 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:27:01.242718 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:27:01.242739 systemd[1]: Set up automount boot.automount. Feb 9 19:27:01.242761 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:27:01.242785 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:27:01.242809 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:27:01.242834 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:27:01.242858 systemd[1]: Reached target integritysetup.target. Feb 9 19:27:01.242880 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:27:01.242901 systemd[1]: Reached target remote-fs.target. Feb 9 19:27:01.242927 systemd[1]: Reached target slices.target. Feb 9 19:27:01.242949 systemd[1]: Reached target swap.target. Feb 9 19:27:01.242970 systemd[1]: Reached target torcx.target. Feb 9 19:27:01.242992 systemd[1]: Reached target veritysetup.target. Feb 9 19:27:01.243016 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:27:01.243037 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:27:01.243060 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:27:01.243116 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:27:01.243154 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:27:01.243193 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:27:01.243217 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:27:01.243240 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:27:01.243264 systemd[1]: Mounting media.mount... Feb 9 19:27:01.243288 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:27:01.243312 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:27:01.243335 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:27:01.243359 systemd[1]: Mounting tmp.mount... Feb 9 19:27:01.243384 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:27:01.243413 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:27:01.243438 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:27:01.243463 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:27:01.243488 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:27:01.243514 systemd[1]: Starting modprobe@drm.service... Feb 9 19:27:01.243541 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:27:01.243565 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:27:01.243589 systemd[1]: Starting modprobe@loop.service... Feb 9 19:27:01.243614 kernel: fuse: init (API version 7.34) Feb 9 19:27:01.243645 kernel: loop: module loaded Feb 9 19:27:01.243672 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:27:01.243696 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:27:01.243721 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:27:01.243744 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:27:01.243768 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:27:01.243804 systemd[1]: Stopped systemd-journald.service. Feb 9 19:27:01.243830 systemd[1]: Starting systemd-journald.service... Feb 9 19:27:01.243852 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:27:01.243877 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:27:01.243909 systemd-journald[994]: Journal started Feb 9 19:27:01.244005 systemd-journald[994]: Runtime Journal (/run/log/journal/493bc8a8cead7e0c7c964d7b46be5442) is 8.0M, max 148.8M, 140.8M free. Feb 9 19:26:56.877000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:26:57.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:26:57.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:26:57.031000 audit: BPF prog-id=10 op=LOAD Feb 9 19:26:57.031000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:26:57.031000 audit: BPF prog-id=11 op=LOAD Feb 9 19:26:57.031000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:26:57.198000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:26:57.198000 audit[903]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:26:57.198000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:26:57.209000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:26:57.209000 audit[903]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:26:57.209000 audit: CWD cwd="/" Feb 9 19:26:57.209000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:26:57.209000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:26:57.209000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:27:00.356000 audit: BPF prog-id=12 op=LOAD Feb 9 19:27:00.356000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:27:00.369000 audit: BPF prog-id=13 op=LOAD Feb 9 19:27:00.384000 audit: BPF prog-id=14 op=LOAD Feb 9 19:27:00.384000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:27:00.384000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:27:00.390000 audit: BPF prog-id=15 op=LOAD Feb 9 19:27:00.390000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:27:00.398000 audit: BPF prog-id=16 op=LOAD Feb 9 19:27:00.412000 audit: BPF prog-id=17 op=LOAD Feb 9 19:27:00.412000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:27:00.412000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:27:00.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:00.448000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:27:00.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:00.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.197000 audit: BPF prog-id=18 op=LOAD Feb 9 19:27:01.197000 audit: BPF prog-id=19 op=LOAD Feb 9 19:27:01.197000 audit: BPF prog-id=20 op=LOAD Feb 9 19:27:01.197000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:27:01.197000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:27:01.238000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:27:01.238000 audit[994]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd7044d390 a2=4000 a3=7ffd7044d42c items=0 ppid=1 pid=994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:01.238000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:26:57.196022 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:57Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:27:00.355824 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:26:57.196972 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:57Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:27:00.414561 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:26:57.196996 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:57Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:26:57.197043 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:57Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:26:57.197056 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:57Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:26:57.197121 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:57Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:26:57.197140 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:57Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:26:57.197355 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:57Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:27:01.255202 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:26:57.197407 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:57Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:26:57.197424 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:57Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:26:57.198364 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:57Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:26:57.198409 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:57Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:26:57.198432 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:57Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:26:57.198449 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:57Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:26:57.198470 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:57Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:26:57.198486 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:57Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:26:59.725414 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:59Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:26:59.725700 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:59Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:26:59.725834 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:59Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:26:59.726065 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:59Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:26:59.726135 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:59Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:26:59.726205 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-09T19:26:59Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:27:01.270382 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:27:01.289493 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:27:01.289725 systemd[1]: Stopped verity-setup.service. Feb 9 19:27:01.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.309112 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:27:01.318135 systemd[1]: Started systemd-journald.service. Feb 9 19:27:01.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.327551 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:27:01.334527 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:27:01.341474 systemd[1]: Mounted media.mount. Feb 9 19:27:01.349477 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:27:01.358439 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:27:01.368456 systemd[1]: Mounted tmp.mount. Feb 9 19:27:01.375637 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:27:01.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.384707 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:27:01.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.393721 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:27:01.393937 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:27:01.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.402759 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:27:01.402963 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:27:01.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.411754 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:27:01.411978 systemd[1]: Finished modprobe@drm.service. Feb 9 19:27:01.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.420771 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:27:01.420984 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:27:01.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.429709 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:27:01.429919 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:27:01.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.438707 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:27:01.438947 systemd[1]: Finished modprobe@loop.service. Feb 9 19:27:01.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.447690 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:27:01.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.456688 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:27:01.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.465778 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:27:01.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.474717 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:27:01.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.484027 systemd[1]: Reached target network-pre.target. Feb 9 19:27:01.493969 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:27:01.504794 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:27:01.512255 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:27:01.514973 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:27:01.524862 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:27:01.535324 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:27:01.537570 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:27:01.545350 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:27:01.547478 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:27:01.556367 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:27:01.561440 systemd-journald[994]: Time spent on flushing to /var/log/journal/493bc8a8cead7e0c7c964d7b46be5442 is 46.517ms for 1189 entries. Feb 9 19:27:01.561440 systemd-journald[994]: System Journal (/var/log/journal/493bc8a8cead7e0c7c964d7b46be5442) is 8.0M, max 584.8M, 576.8M free. Feb 9 19:27:01.656492 systemd-journald[994]: Received client request to flush runtime journal. Feb 9 19:27:01.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.571850 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:27:01.583038 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:27:01.658524 udevadm[1008]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 19:27:01.591545 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:27:01.601623 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:27:01.610682 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:27:01.622821 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:27:01.642981 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:27:01.653159 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:27:01.663945 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:27:01.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:01.709098 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:27:01.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:02.261781 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:27:02.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:02.270000 audit: BPF prog-id=21 op=LOAD Feb 9 19:27:02.270000 audit: BPF prog-id=22 op=LOAD Feb 9 19:27:02.270000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:27:02.270000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:27:02.272139 systemd[1]: Starting systemd-udevd.service... Feb 9 19:27:02.295060 systemd-udevd[1013]: Using default interface naming scheme 'v252'. Feb 9 19:27:02.339499 systemd[1]: Started systemd-udevd.service. Feb 9 19:27:02.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:02.350000 audit: BPF prog-id=23 op=LOAD Feb 9 19:27:02.352615 systemd[1]: Starting systemd-networkd.service... Feb 9 19:27:02.366000 audit: BPF prog-id=24 op=LOAD Feb 9 19:27:02.366000 audit: BPF prog-id=25 op=LOAD Feb 9 19:27:02.366000 audit: BPF prog-id=26 op=LOAD Feb 9 19:27:02.368576 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:27:02.426320 systemd[1]: Started systemd-userdbd.service. Feb 9 19:27:02.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:02.435618 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:27:02.550195 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 19:27:02.552757 systemd-networkd[1027]: lo: Link UP Feb 9 19:27:02.552770 systemd-networkd[1027]: lo: Gained carrier Feb 9 19:27:02.553530 systemd-networkd[1027]: Enumeration completed Feb 9 19:27:02.553707 systemd[1]: Started systemd-networkd.service. Feb 9 19:27:02.554031 systemd-networkd[1027]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:27:02.556136 systemd-networkd[1027]: eth0: Link UP Feb 9 19:27:02.556316 systemd-networkd[1027]: eth0: Gained carrier Feb 9 19:27:02.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:02.566326 systemd-networkd[1027]: eth0: DHCPv4 address 10.128.0.111/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 9 19:27:02.577339 kernel: ACPI: button: Power Button [PWRF] Feb 9 19:27:02.588123 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Feb 9 19:27:02.627111 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1039) Feb 9 19:27:02.584000 audit[1028]: AVC avc: denied { confidentiality } for pid=1028 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:27:02.584000 audit[1028]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5631e42f15e0 a1=32194 a2=7f3461969bc5 a3=5 items=108 ppid=1013 pid=1028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:02.584000 audit: CWD cwd="/" Feb 9 19:27:02.584000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=1 name=(null) inode=14339 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=2 name=(null) inode=14339 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=3 name=(null) inode=14342 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=4 name=(null) inode=14339 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=5 name=(null) inode=14343 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=6 name=(null) inode=14339 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=7 name=(null) inode=14344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=8 name=(null) inode=14344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=9 name=(null) inode=14345 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=10 name=(null) inode=14344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=11 name=(null) inode=14346 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=12 name=(null) inode=14344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=13 name=(null) inode=14347 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=14 name=(null) inode=14344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=15 name=(null) inode=14348 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=16 name=(null) inode=14344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=17 name=(null) inode=14349 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=18 name=(null) inode=14339 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=19 name=(null) inode=14350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=20 name=(null) inode=14350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=21 name=(null) inode=14351 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=22 name=(null) inode=14350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=23 name=(null) inode=14352 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=24 name=(null) inode=14350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=25 name=(null) inode=14353 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=26 name=(null) inode=14350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=27 name=(null) inode=14354 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=28 name=(null) inode=14350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=29 name=(null) inode=14355 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=30 name=(null) inode=14339 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=31 name=(null) inode=14356 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=32 name=(null) inode=14356 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=33 name=(null) inode=14357 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=34 name=(null) inode=14356 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=35 name=(null) inode=14358 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=36 name=(null) inode=14356 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=37 name=(null) inode=14359 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=38 name=(null) inode=14356 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=39 name=(null) inode=14360 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=40 name=(null) inode=14356 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=41 name=(null) inode=14361 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=42 name=(null) inode=14339 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=43 name=(null) inode=14362 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=44 name=(null) inode=14362 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=45 name=(null) inode=14363 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=46 name=(null) inode=14362 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=47 name=(null) inode=14364 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=48 name=(null) inode=14362 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=49 name=(null) inode=14365 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=50 name=(null) inode=14362 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=51 name=(null) inode=14366 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=52 name=(null) inode=14362 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=53 name=(null) inode=14367 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=55 name=(null) inode=14368 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=56 name=(null) inode=14368 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=57 name=(null) inode=14369 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=58 name=(null) inode=14368 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=59 name=(null) inode=14370 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=60 name=(null) inode=14368 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=61 name=(null) inode=14371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=62 name=(null) inode=14371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=63 name=(null) inode=14372 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=64 name=(null) inode=14371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=65 name=(null) inode=14373 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=66 name=(null) inode=14371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=67 name=(null) inode=14374 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=68 name=(null) inode=14371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=69 name=(null) inode=14375 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=70 name=(null) inode=14371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=71 name=(null) inode=14376 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=72 name=(null) inode=14368 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=73 name=(null) inode=14377 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=74 name=(null) inode=14377 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=75 name=(null) inode=14378 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=76 name=(null) inode=14377 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=77 name=(null) inode=14379 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=78 name=(null) inode=14377 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=79 name=(null) inode=14380 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=80 name=(null) inode=14377 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=81 name=(null) inode=14381 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=82 name=(null) inode=14377 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=83 name=(null) inode=14382 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=84 name=(null) inode=14368 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=85 name=(null) inode=14383 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=86 name=(null) inode=14383 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=87 name=(null) inode=14384 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=88 name=(null) inode=14383 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=89 name=(null) inode=14385 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=90 name=(null) inode=14383 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=91 name=(null) inode=14386 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=92 name=(null) inode=14383 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=93 name=(null) inode=14387 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=94 name=(null) inode=14383 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=95 name=(null) inode=14388 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=96 name=(null) inode=14368 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=97 name=(null) inode=14389 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=98 name=(null) inode=14389 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=99 name=(null) inode=14390 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=100 name=(null) inode=14389 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=101 name=(null) inode=14391 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=102 name=(null) inode=14389 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=103 name=(null) inode=14392 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=104 name=(null) inode=14389 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=105 name=(null) inode=14393 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=106 name=(null) inode=14389 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PATH item=107 name=(null) inode=14394 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:27:02.584000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 19:27:02.696109 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Feb 9 19:27:02.706268 kernel: ACPI: button: Sleep Button [SLPF] Feb 9 19:27:02.714109 kernel: EDAC MC: Ver: 3.0.0 Feb 9 19:27:02.727112 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Feb 9 19:27:02.740191 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 19:27:02.760930 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:27:02.769616 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:27:02.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:02.780977 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:27:02.811175 lvm[1050]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:27:02.839585 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:27:02.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:02.848480 systemd[1]: Reached target cryptsetup.target. Feb 9 19:27:02.858854 systemd[1]: Starting lvm2-activation.service... Feb 9 19:27:02.865017 lvm[1051]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:27:02.890554 systemd[1]: Finished lvm2-activation.service. Feb 9 19:27:02.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:02.900485 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:27:02.909308 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:27:02.909368 systemd[1]: Reached target local-fs.target. Feb 9 19:27:02.918268 systemd[1]: Reached target machines.target. Feb 9 19:27:02.927877 systemd[1]: Starting ldconfig.service... Feb 9 19:27:02.936271 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:27:02.936373 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:27:02.938249 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:27:02.946990 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:27:02.960279 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:27:02.960689 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:27:02.960794 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:27:02.963244 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:27:02.966376 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1053 (bootctl) Feb 9 19:27:02.974077 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:27:02.989813 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:27:02.995762 systemd-tmpfiles[1057]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:27:02.999035 systemd-tmpfiles[1057]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:27:02.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:03.002750 systemd-tmpfiles[1057]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:27:03.124185 systemd-fsck[1062]: fsck.fat 4.2 (2021-01-31) Feb 9 19:27:03.124185 systemd-fsck[1062]: /dev/sda1: 789 files, 115339/258078 clusters Feb 9 19:27:03.126460 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:27:03.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:03.138177 systemd[1]: Mounting boot.mount... Feb 9 19:27:03.187132 systemd[1]: Mounted boot.mount. Feb 9 19:27:03.212698 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:27:03.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:03.367610 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:27:03.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:03.378703 systemd[1]: Starting audit-rules.service... Feb 9 19:27:03.387935 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:27:03.398261 systemd[1]: Starting oem-gce-enable-oslogin.service... Feb 9 19:27:03.409292 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:27:03.418000 audit: BPF prog-id=27 op=LOAD Feb 9 19:27:03.421234 systemd[1]: Starting systemd-resolved.service... Feb 9 19:27:03.430000 audit: BPF prog-id=28 op=LOAD Feb 9 19:27:03.434021 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:27:03.443472 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:27:03.453076 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:27:03.459000 audit[1086]: SYSTEM_BOOT pid=1086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:27:03.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:03.468008 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Feb 9 19:27:03.468551 systemd[1]: Finished oem-gce-enable-oslogin.service. Feb 9 19:27:03.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:03.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:03.477894 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:27:03.486621 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:27:03.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:03.575099 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:27:03.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:03.595452 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:27:04.064981 systemd-timesyncd[1082]: Contacted time server 169.254.169.254:123 (169.254.169.254). Feb 9 19:27:04.065069 systemd-timesyncd[1082]: Initial clock synchronization to Fri 2024-02-09 19:27:04.064857 UTC. Feb 9 19:27:04.067549 augenrules[1097]: No rules Feb 9 19:27:04.066000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:27:04.066000 audit[1097]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe5cff0fd0 a2=420 a3=0 items=0 ppid=1067 pid=1097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:04.066000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:27:04.068425 systemd-resolved[1079]: Positive Trust Anchors: Feb 9 19:27:04.069248 systemd-resolved[1079]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:27:04.069319 systemd-resolved[1079]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:27:04.073968 systemd[1]: Finished audit-rules.service. Feb 9 19:27:04.081526 systemd[1]: Reached target time-set.target. Feb 9 19:27:04.104477 systemd-resolved[1079]: Defaulting to hostname 'linux'. Feb 9 19:27:04.107414 systemd[1]: Started systemd-resolved.service. Feb 9 19:27:04.116455 systemd[1]: Reached target network.target. Feb 9 19:27:04.125345 systemd[1]: Reached target nss-lookup.target. Feb 9 19:27:04.297284 ldconfig[1052]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:27:04.380688 systemd[1]: Finished ldconfig.service. Feb 9 19:27:04.390645 systemd[1]: Starting systemd-update-done.service... Feb 9 19:27:04.399467 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:27:04.400593 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:27:04.409681 systemd[1]: Finished systemd-update-done.service. Feb 9 19:27:04.418544 systemd[1]: Reached target sysinit.target. Feb 9 19:27:04.428431 systemd[1]: Started motdgen.path. Feb 9 19:27:04.435417 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:27:04.445557 systemd[1]: Started logrotate.timer. Feb 9 19:27:04.452481 systemd[1]: Started mdadm.timer. Feb 9 19:27:04.459324 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:27:04.467328 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:27:04.467389 systemd[1]: Reached target paths.target. Feb 9 19:27:04.474321 systemd[1]: Reached target timers.target. Feb 9 19:27:04.481714 systemd[1]: Listening on dbus.socket. Feb 9 19:27:04.489600 systemd[1]: Starting docker.socket... Feb 9 19:27:04.500100 systemd[1]: Listening on sshd.socket. Feb 9 19:27:04.507418 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:27:04.508106 systemd[1]: Listening on docker.socket. Feb 9 19:27:04.515405 systemd[1]: Reached target sockets.target. Feb 9 19:27:04.523289 systemd[1]: Reached target basic.target. Feb 9 19:27:04.530351 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:27:04.530394 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:27:04.531878 systemd[1]: Starting containerd.service... Feb 9 19:27:04.540692 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 19:27:04.550986 systemd[1]: Starting dbus.service... Feb 9 19:27:04.557958 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:27:04.567777 systemd[1]: Starting extend-filesystems.service... Feb 9 19:27:04.569145 jq[1109]: false Feb 9 19:27:04.576304 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:27:04.578115 systemd[1]: Starting motdgen.service... Feb 9 19:27:04.584587 systemd[1]: Starting oem-gce.service... Feb 9 19:27:04.592925 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:27:04.601900 systemd[1]: Starting prepare-critools.service... Feb 9 19:27:04.611112 systemd[1]: Starting prepare-helm.service... Feb 9 19:27:04.620022 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:27:04.629051 systemd[1]: Starting sshd-keygen.service... Feb 9 19:27:04.640664 extend-filesystems[1110]: Found sda Feb 9 19:27:04.641987 systemd[1]: Starting systemd-logind.service... Feb 9 19:27:04.654142 extend-filesystems[1110]: Found sda1 Feb 9 19:27:04.662516 extend-filesystems[1110]: Found sda2 Feb 9 19:27:04.662516 extend-filesystems[1110]: Found sda3 Feb 9 19:27:04.662516 extend-filesystems[1110]: Found usr Feb 9 19:27:04.662516 extend-filesystems[1110]: Found sda4 Feb 9 19:27:04.662516 extend-filesystems[1110]: Found sda6 Feb 9 19:27:04.662516 extend-filesystems[1110]: Found sda7 Feb 9 19:27:04.662516 extend-filesystems[1110]: Found sda9 Feb 9 19:27:04.662516 extend-filesystems[1110]: Checking size of /dev/sda9 Feb 9 19:27:04.655462 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:27:04.744512 extend-filesystems[1110]: Resized partition /dev/sda9 Feb 9 19:27:04.655603 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Feb 9 19:27:04.752233 jq[1136]: true Feb 9 19:27:04.656689 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:27:04.658242 systemd[1]: Starting update-engine.service... Feb 9 19:27:04.753233 tar[1139]: ./ Feb 9 19:27:04.753233 tar[1139]: ./loopback Feb 9 19:27:04.665631 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:27:04.678307 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:27:04.678876 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:27:04.679884 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:27:04.680309 systemd[1]: Finished motdgen.service. Feb 9 19:27:04.755421 jq[1143]: true Feb 9 19:27:04.694918 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:27:04.755964 mkfs.ext4[1146]: mke2fs 1.46.5 (30-Dec-2021) Feb 9 19:27:04.755964 mkfs.ext4[1146]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Feb 9 19:27:04.755964 mkfs.ext4[1146]: Creating filesystem with 262144 4k blocks and 65536 inodes Feb 9 19:27:04.755964 mkfs.ext4[1146]: Filesystem UUID: 08afc055-58c2-4209-8b21-7532a50f38b4 Feb 9 19:27:04.755964 mkfs.ext4[1146]: Superblock backups stored on blocks: Feb 9 19:27:04.755964 mkfs.ext4[1146]: 32768, 98304, 163840, 229376 Feb 9 19:27:04.755964 mkfs.ext4[1146]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:27:04.755964 mkfs.ext4[1146]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:27:04.695236 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:27:04.757640 mkfs.ext4[1146]: Creating journal (8192 blocks): done Feb 9 19:27:04.761887 dbus-daemon[1108]: [system] SELinux support is enabled Feb 9 19:27:04.762142 systemd[1]: Started dbus.service. Feb 9 19:27:04.774372 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:27:04.774424 systemd[1]: Reached target system-config.target. Feb 9 19:27:04.775346 mkfs.ext4[1146]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:27:04.783380 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:27:04.783413 systemd[1]: Reached target user-config.target. Feb 9 19:27:04.784064 dbus-daemon[1108]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1027 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 9 19:27:04.791715 extend-filesystems[1151]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 19:27:04.812289 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Feb 9 19:27:04.811891 systemd[1]: Starting systemd-hostnamed.service... Feb 9 19:27:04.795096 dbus-daemon[1108]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 19:27:04.845901 tar[1140]: crictl Feb 9 19:27:04.852050 tar[1141]: linux-amd64/helm Feb 9 19:27:04.857527 umount[1163]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Feb 9 19:27:04.885904 update_engine[1134]: I0209 19:27:04.885552 1134 main.cc:92] Flatcar Update Engine starting Feb 9 19:27:04.891869 systemd[1]: Started update-engine.service. Feb 9 19:27:04.892535 update_engine[1134]: I0209 19:27:04.891947 1134 update_check_scheduler.cc:74] Next update check in 11m7s Feb 9 19:27:04.907236 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Feb 9 19:27:04.907340 kernel: loop0: detected capacity change from 0 to 2097152 Feb 9 19:27:04.915637 systemd[1]: Started locksmithd.service. Feb 9 19:27:04.954835 extend-filesystems[1151]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 9 19:27:04.954835 extend-filesystems[1151]: old_desc_blocks = 1, new_desc_blocks = 2 Feb 9 19:27:04.954835 extend-filesystems[1151]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Feb 9 19:27:04.954449 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:27:05.012529 bash[1177]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:27:05.012672 extend-filesystems[1110]: Resized filesystem in /dev/sda9 Feb 9 19:27:04.954713 systemd[1]: Finished extend-filesystems.service. Feb 9 19:27:04.973604 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:27:05.032233 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:27:05.060428 systemd-networkd[1027]: eth0: Gained IPv6LL Feb 9 19:27:05.065218 env[1144]: time="2024-02-09T19:27:05.065116882Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:27:05.079544 coreos-metadata[1107]: Feb 09 19:27:05.079 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Feb 9 19:27:05.083125 coreos-metadata[1107]: Feb 09 19:27:05.082 INFO Fetch failed with 404: resource not found Feb 9 19:27:05.083125 coreos-metadata[1107]: Feb 09 19:27:05.083 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Feb 9 19:27:05.084164 coreos-metadata[1107]: Feb 09 19:27:05.084 INFO Fetch successful Feb 9 19:27:05.084164 coreos-metadata[1107]: Feb 09 19:27:05.084 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Feb 9 19:27:05.085059 coreos-metadata[1107]: Feb 09 19:27:05.084 INFO Fetch failed with 404: resource not found Feb 9 19:27:05.085059 coreos-metadata[1107]: Feb 09 19:27:05.084 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Feb 9 19:27:05.095005 coreos-metadata[1107]: Feb 09 19:27:05.094 INFO Fetch failed with 404: resource not found Feb 9 19:27:05.095005 coreos-metadata[1107]: Feb 09 19:27:05.094 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Feb 9 19:27:05.098097 coreos-metadata[1107]: Feb 09 19:27:05.097 INFO Fetch successful Feb 9 19:27:05.101295 unknown[1107]: wrote ssh authorized keys file for user: core Feb 9 19:27:05.144663 tar[1139]: ./bandwidth Feb 9 19:27:05.150837 update-ssh-keys[1185]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:27:05.152502 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 19:27:05.165932 systemd-logind[1129]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 19:27:05.171315 systemd-logind[1129]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 19:27:05.171514 systemd-logind[1129]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 19:27:05.171868 systemd-logind[1129]: New seat seat0. Feb 9 19:27:05.179614 systemd[1]: Started systemd-logind.service. Feb 9 19:27:05.368085 dbus-daemon[1108]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 9 19:27:05.368331 systemd[1]: Started systemd-hostnamed.service. Feb 9 19:27:05.369347 dbus-daemon[1108]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1159 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 9 19:27:05.381307 systemd[1]: Starting polkit.service... Feb 9 19:27:05.391540 env[1144]: time="2024-02-09T19:27:05.391447956Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:27:05.391876 env[1144]: time="2024-02-09T19:27:05.391843069Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:27:05.394221 env[1144]: time="2024-02-09T19:27:05.394144344Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:27:05.407107 env[1144]: time="2024-02-09T19:27:05.406999712Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:27:05.407705 env[1144]: time="2024-02-09T19:27:05.407661986Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:27:05.407869 env[1144]: time="2024-02-09T19:27:05.407844204Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:27:05.408120 env[1144]: time="2024-02-09T19:27:05.408090012Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:27:05.408284 env[1144]: time="2024-02-09T19:27:05.408241350Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:27:05.408584 env[1144]: time="2024-02-09T19:27:05.408553070Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:27:05.411521 env[1144]: time="2024-02-09T19:27:05.411487219Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:27:05.411905 env[1144]: time="2024-02-09T19:27:05.411862996Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:27:05.412021 env[1144]: time="2024-02-09T19:27:05.411999292Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:27:05.412231 env[1144]: time="2024-02-09T19:27:05.412205296Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:27:05.412354 env[1144]: time="2024-02-09T19:27:05.412333009Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:27:05.420907 env[1144]: time="2024-02-09T19:27:05.420857869Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:27:05.421096 env[1144]: time="2024-02-09T19:27:05.421069804Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:27:05.421276 env[1144]: time="2024-02-09T19:27:05.421250904Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:27:05.421518 env[1144]: time="2024-02-09T19:27:05.421426109Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:27:05.421683 env[1144]: time="2024-02-09T19:27:05.421658324Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:27:05.421834 env[1144]: time="2024-02-09T19:27:05.421809293Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:27:05.421993 env[1144]: time="2024-02-09T19:27:05.421970103Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:27:05.422130 env[1144]: time="2024-02-09T19:27:05.422104511Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:27:05.422306 env[1144]: time="2024-02-09T19:27:05.422282326Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:27:05.422441 env[1144]: time="2024-02-09T19:27:05.422417662Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:27:05.422572 env[1144]: time="2024-02-09T19:27:05.422549940Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:27:05.422699 env[1144]: time="2024-02-09T19:27:05.422677519Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:27:05.423002 env[1144]: time="2024-02-09T19:27:05.422975966Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:27:05.423282 env[1144]: time="2024-02-09T19:27:05.423256087Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:27:05.429225 env[1144]: time="2024-02-09T19:27:05.429186530Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:27:05.429445 env[1144]: time="2024-02-09T19:27:05.429407671Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:27:05.429575 env[1144]: time="2024-02-09T19:27:05.429551565Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:27:05.429792 env[1144]: time="2024-02-09T19:27:05.429769399Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:27:05.430002 env[1144]: time="2024-02-09T19:27:05.429979443Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:27:05.430133 env[1144]: time="2024-02-09T19:27:05.430112086Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:27:05.430280 env[1144]: time="2024-02-09T19:27:05.430244120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:27:05.430441 env[1144]: time="2024-02-09T19:27:05.430416106Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:27:05.430572 env[1144]: time="2024-02-09T19:27:05.430550144Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:27:05.430728 env[1144]: time="2024-02-09T19:27:05.430699029Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:27:05.430880 env[1144]: time="2024-02-09T19:27:05.430855466Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:27:05.431058 env[1144]: time="2024-02-09T19:27:05.431032344Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:27:05.431442 env[1144]: time="2024-02-09T19:27:05.431414233Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:27:05.431583 env[1144]: time="2024-02-09T19:27:05.431558689Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:27:05.431756 env[1144]: time="2024-02-09T19:27:05.431732002Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:27:05.431902 env[1144]: time="2024-02-09T19:27:05.431872784Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:27:05.432033 env[1144]: time="2024-02-09T19:27:05.432008756Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:27:05.432239 env[1144]: time="2024-02-09T19:27:05.432214064Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:27:05.432390 env[1144]: time="2024-02-09T19:27:05.432365976Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:27:05.432589 env[1144]: time="2024-02-09T19:27:05.432545230Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:27:05.433107 env[1144]: time="2024-02-09T19:27:05.433016319Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:27:05.436975 env[1144]: time="2024-02-09T19:27:05.436944227Z" level=info msg="Connect containerd service" Feb 9 19:27:05.437199 env[1144]: time="2024-02-09T19:27:05.437148866Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:27:05.438335 env[1144]: time="2024-02-09T19:27:05.438298059Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:27:05.443756 env[1144]: time="2024-02-09T19:27:05.443701161Z" level=info msg="Start subscribing containerd event" Feb 9 19:27:05.443948 env[1144]: time="2024-02-09T19:27:05.443914734Z" level=info msg="Start recovering state" Feb 9 19:27:05.446533 env[1144]: time="2024-02-09T19:27:05.446492494Z" level=info msg="Start event monitor" Feb 9 19:27:05.446672 env[1144]: time="2024-02-09T19:27:05.446650351Z" level=info msg="Start snapshots syncer" Feb 9 19:27:05.446796 env[1144]: time="2024-02-09T19:27:05.446776460Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:27:05.446938 env[1144]: time="2024-02-09T19:27:05.446918128Z" level=info msg="Start streaming server" Feb 9 19:27:05.464916 env[1144]: time="2024-02-09T19:27:05.464857834Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:27:05.465209 env[1144]: time="2024-02-09T19:27:05.465158985Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:27:05.465524 systemd[1]: Started containerd.service. Feb 9 19:27:05.465853 env[1144]: time="2024-02-09T19:27:05.465825710Z" level=info msg="containerd successfully booted in 0.401782s" Feb 9 19:27:05.481278 polkitd[1187]: Started polkitd version 121 Feb 9 19:27:05.486656 tar[1139]: ./ptp Feb 9 19:27:05.506110 polkitd[1187]: Loading rules from directory /etc/polkit-1/rules.d Feb 9 19:27:05.514438 polkitd[1187]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 9 19:27:05.521380 polkitd[1187]: Finished loading, compiling and executing 2 rules Feb 9 19:27:05.522243 dbus-daemon[1108]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 9 19:27:05.522495 systemd[1]: Started polkit.service. Feb 9 19:27:05.523566 polkitd[1187]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 9 19:27:05.562845 systemd-hostnamed[1159]: Hostname set to (transient) Feb 9 19:27:05.565600 systemd-resolved[1079]: System hostname changed to 'ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal'. Feb 9 19:27:05.706690 tar[1139]: ./vlan Feb 9 19:27:05.901014 tar[1139]: ./host-device Feb 9 19:27:06.085592 tar[1139]: ./tuning Feb 9 19:27:06.217283 tar[1139]: ./vrf Feb 9 19:27:06.368358 tar[1139]: ./sbr Feb 9 19:27:06.503817 tar[1139]: ./tap Feb 9 19:27:06.656596 tar[1139]: ./dhcp Feb 9 19:27:06.793836 tar[1141]: linux-amd64/LICENSE Feb 9 19:27:06.794383 tar[1141]: linux-amd64/README.md Feb 9 19:27:06.811484 systemd[1]: Finished prepare-helm.service. Feb 9 19:27:06.918800 systemd[1]: Finished prepare-critools.service. Feb 9 19:27:06.963683 tar[1139]: ./static Feb 9 19:27:07.018622 tar[1139]: ./firewall Feb 9 19:27:07.103414 tar[1139]: ./macvlan Feb 9 19:27:07.195138 tar[1139]: ./dummy Feb 9 19:27:07.289635 tar[1139]: ./bridge Feb 9 19:27:07.396691 tar[1139]: ./ipvlan Feb 9 19:27:07.464694 tar[1139]: ./portmap Feb 9 19:27:07.549582 tar[1139]: ./host-local Feb 9 19:27:07.650163 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:27:07.763259 sshd_keygen[1132]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:27:07.808942 systemd[1]: Finished sshd-keygen.service. Feb 9 19:27:07.818587 systemd[1]: Starting issuegen.service... Feb 9 19:27:07.827512 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:27:07.827769 systemd[1]: Finished issuegen.service. Feb 9 19:27:07.840046 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:27:07.853973 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:27:07.866142 systemd[1]: Started getty@tty1.service. Feb 9 19:27:07.877204 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:27:07.886736 systemd[1]: Reached target getty.target. Feb 9 19:27:07.938394 locksmithd[1176]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:27:10.630506 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Feb 9 19:27:12.664208 kernel: loop0: detected capacity change from 0 to 2097152 Feb 9 19:27:12.697893 systemd-nspawn[1220]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Feb 9 19:27:12.697893 systemd-nspawn[1220]: Press ^] three times within 1s to kill container. Feb 9 19:27:12.717222 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:27:12.805047 systemd[1]: Started oem-gce.service. Feb 9 19:27:12.813839 systemd[1]: Reached target multi-user.target. Feb 9 19:27:12.824461 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:27:12.837341 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:27:12.837604 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:27:12.847453 systemd[1]: Startup finished in 1.014s (kernel) + 8.947s (initrd) + 15.626s (userspace) = 25.589s. Feb 9 19:27:12.890329 systemd-nspawn[1220]: + '[' -e /etc/default/instance_configs.cfg.template ']' Feb 9 19:27:12.890329 systemd-nspawn[1220]: + echo -e '[InstanceSetup]\nset_host_keys = false' Feb 9 19:27:12.890580 systemd-nspawn[1220]: + /usr/bin/google_instance_setup Feb 9 19:27:13.597913 instance-setup[1226]: INFO Running google_set_multiqueue. Feb 9 19:27:13.611856 instance-setup[1226]: INFO Set channels for eth0 to 2. Feb 9 19:27:13.615884 instance-setup[1226]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Feb 9 19:27:13.617420 instance-setup[1226]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Feb 9 19:27:13.617979 instance-setup[1226]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Feb 9 19:27:13.619304 instance-setup[1226]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Feb 9 19:27:13.619724 instance-setup[1226]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Feb 9 19:27:13.621242 instance-setup[1226]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Feb 9 19:27:13.621853 instance-setup[1226]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Feb 9 19:27:13.623205 instance-setup[1226]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Feb 9 19:27:13.634217 instance-setup[1226]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Feb 9 19:27:13.634427 instance-setup[1226]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Feb 9 19:27:13.672262 systemd-nspawn[1220]: + /usr/bin/google_metadata_script_runner --script-type startup Feb 9 19:27:13.753773 systemd[1]: Created slice system-sshd.slice. Feb 9 19:27:13.755714 systemd[1]: Started sshd@0-10.128.0.111:22-147.75.109.163:47116.service. Feb 9 19:27:14.028092 startup-script[1257]: INFO Starting startup scripts. Feb 9 19:27:14.042673 startup-script[1257]: INFO No startup scripts found in metadata. Feb 9 19:27:14.042831 startup-script[1257]: INFO Finished running startup scripts. Feb 9 19:27:14.074628 systemd-nspawn[1220]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Feb 9 19:27:14.074628 systemd-nspawn[1220]: + daemon_pids=() Feb 9 19:27:14.074628 systemd-nspawn[1220]: + for d in accounts clock_skew network Feb 9 19:27:14.075203 systemd-nspawn[1220]: + daemon_pids+=($!) Feb 9 19:27:14.075324 systemd-nspawn[1220]: + for d in accounts clock_skew network Feb 9 19:27:14.075436 systemd-nspawn[1220]: + /usr/bin/google_accounts_daemon Feb 9 19:27:14.075796 systemd-nspawn[1220]: + daemon_pids+=($!) Feb 9 19:27:14.075903 systemd-nspawn[1220]: + for d in accounts clock_skew network Feb 9 19:27:14.076252 systemd-nspawn[1220]: + daemon_pids+=($!) Feb 9 19:27:14.076410 systemd-nspawn[1220]: + NOTIFY_SOCKET=/run/systemd/notify Feb 9 19:27:14.076490 systemd-nspawn[1220]: + /usr/bin/systemd-notify --ready Feb 9 19:27:14.077325 systemd-nspawn[1220]: + /usr/bin/google_clock_skew_daemon Feb 9 19:27:14.082342 systemd-nspawn[1220]: + /usr/bin/google_network_daemon Feb 9 19:27:14.091613 sshd[1259]: Accepted publickey for core from 147.75.109.163 port 47116 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:27:14.094498 sshd[1259]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:27:14.112750 systemd[1]: Created slice user-500.slice. Feb 9 19:27:14.114676 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:27:14.122831 systemd-logind[1129]: New session 1 of user core. Feb 9 19:27:14.132210 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:27:14.134773 systemd[1]: Starting user@500.service... Feb 9 19:27:14.157213 (systemd)[1268]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:27:14.158067 systemd-nspawn[1220]: + wait -n 36 37 38 Feb 9 19:27:14.347547 systemd[1268]: Queued start job for default target default.target. Feb 9 19:27:14.348411 systemd[1268]: Reached target paths.target. Feb 9 19:27:14.348455 systemd[1268]: Reached target sockets.target. Feb 9 19:27:14.348478 systemd[1268]: Reached target timers.target. Feb 9 19:27:14.348498 systemd[1268]: Reached target basic.target. Feb 9 19:27:14.348653 systemd[1]: Started user@500.service. Feb 9 19:27:14.350107 systemd[1]: Started session-1.scope. Feb 9 19:27:14.350765 systemd[1268]: Reached target default.target. Feb 9 19:27:14.351037 systemd[1268]: Startup finished in 175ms. Feb 9 19:27:14.578303 systemd[1]: Started sshd@1-10.128.0.111:22-147.75.109.163:58276.service. Feb 9 19:27:14.890852 sshd[1277]: Accepted publickey for core from 147.75.109.163 port 58276 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:27:14.892302 sshd[1277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:27:14.899443 systemd-logind[1129]: New session 2 of user core. Feb 9 19:27:14.900187 systemd[1]: Started session-2.scope. Feb 9 19:27:14.926730 google-clock-skew[1264]: INFO Starting Google Clock Skew daemon. Feb 9 19:27:14.941586 google-clock-skew[1264]: INFO Clock drift token has changed: 0. Feb 9 19:27:14.952469 systemd-nspawn[1220]: hwclock: Cannot access the Hardware Clock via any known method. Feb 9 19:27:14.952469 systemd-nspawn[1220]: hwclock: Use the --verbose option to see the details of our search for an access method. Feb 9 19:27:14.953448 google-clock-skew[1264]: WARNING Failed to sync system time with hardware clock. Feb 9 19:27:15.024509 google-networking[1265]: INFO Starting Google Networking daemon. Feb 9 19:27:15.078050 groupadd[1288]: group added to /etc/group: name=google-sudoers, GID=1000 Feb 9 19:27:15.086122 groupadd[1288]: group added to /etc/gshadow: name=google-sudoers Feb 9 19:27:15.092570 groupadd[1288]: new group: name=google-sudoers, GID=1000 Feb 9 19:27:15.112115 google-accounts[1263]: INFO Starting Google Accounts daemon. Feb 9 19:27:15.112941 sshd[1277]: pam_unix(sshd:session): session closed for user core Feb 9 19:27:15.118499 systemd[1]: sshd@1-10.128.0.111:22-147.75.109.163:58276.service: Deactivated successfully. Feb 9 19:27:15.119618 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 19:27:15.123064 systemd-logind[1129]: Session 2 logged out. Waiting for processes to exit. Feb 9 19:27:15.125141 systemd-logind[1129]: Removed session 2. Feb 9 19:27:15.146236 google-accounts[1263]: WARNING OS Login not installed. Feb 9 19:27:15.147764 google-accounts[1263]: INFO Creating a new user account for 0. Feb 9 19:27:15.154105 systemd-nspawn[1220]: useradd: invalid user name '0': use --badname to ignore Feb 9 19:27:15.155491 google-accounts[1263]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Feb 9 19:27:15.159083 systemd[1]: Started sshd@2-10.128.0.111:22-147.75.109.163:58280.service. Feb 9 19:27:15.445146 sshd[1301]: Accepted publickey for core from 147.75.109.163 port 58280 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:27:15.447454 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:27:15.454097 systemd[1]: Started session-3.scope. Feb 9 19:27:15.454905 systemd-logind[1129]: New session 3 of user core. Feb 9 19:27:15.653073 sshd[1301]: pam_unix(sshd:session): session closed for user core Feb 9 19:27:15.657313 systemd[1]: sshd@2-10.128.0.111:22-147.75.109.163:58280.service: Deactivated successfully. Feb 9 19:27:15.658358 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 19:27:15.659352 systemd-logind[1129]: Session 3 logged out. Waiting for processes to exit. Feb 9 19:27:15.660572 systemd-logind[1129]: Removed session 3. Feb 9 19:27:15.700455 systemd[1]: Started sshd@3-10.128.0.111:22-147.75.109.163:58288.service. Feb 9 19:27:15.990661 sshd[1308]: Accepted publickey for core from 147.75.109.163 port 58288 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:27:15.992387 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:27:15.998344 systemd-logind[1129]: New session 4 of user core. Feb 9 19:27:15.999105 systemd[1]: Started session-4.scope. Feb 9 19:27:16.208250 sshd[1308]: pam_unix(sshd:session): session closed for user core Feb 9 19:27:16.212122 systemd[1]: sshd@3-10.128.0.111:22-147.75.109.163:58288.service: Deactivated successfully. Feb 9 19:27:16.213195 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:27:16.214052 systemd-logind[1129]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:27:16.215334 systemd-logind[1129]: Removed session 4. Feb 9 19:27:16.252577 systemd[1]: Started sshd@4-10.128.0.111:22-147.75.109.163:58292.service. Feb 9 19:27:16.535829 sshd[1314]: Accepted publickey for core from 147.75.109.163 port 58292 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:27:16.537634 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:27:16.544156 systemd[1]: Started session-5.scope. Feb 9 19:27:16.545010 systemd-logind[1129]: New session 5 of user core. Feb 9 19:27:16.732192 sudo[1317]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:27:16.732582 sudo[1317]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:27:16.742419 dbus-daemon[1108]: \xd0}\xb9ƳU: received setenforce notice (enforcing=-699962432) Feb 9 19:27:16.744591 sudo[1317]: pam_unix(sudo:session): session closed for user root Feb 9 19:27:16.788663 sshd[1314]: pam_unix(sshd:session): session closed for user core Feb 9 19:27:16.793449 systemd[1]: sshd@4-10.128.0.111:22-147.75.109.163:58292.service: Deactivated successfully. Feb 9 19:27:16.794602 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:27:16.795587 systemd-logind[1129]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:27:16.797081 systemd-logind[1129]: Removed session 5. Feb 9 19:27:16.836521 systemd[1]: Started sshd@5-10.128.0.111:22-147.75.109.163:58306.service. Feb 9 19:27:17.128766 sshd[1321]: Accepted publickey for core from 147.75.109.163 port 58306 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:27:17.130976 sshd[1321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:27:17.137746 systemd[1]: Started session-6.scope. Feb 9 19:27:17.138365 systemd-logind[1129]: New session 6 of user core. Feb 9 19:27:17.309557 sudo[1325]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:27:17.309951 sudo[1325]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:27:17.314237 sudo[1325]: pam_unix(sudo:session): session closed for user root Feb 9 19:27:17.326258 sudo[1324]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:27:17.326638 sudo[1324]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:27:17.339195 systemd[1]: Stopping audit-rules.service... Feb 9 19:27:17.341083 auditctl[1328]: No rules Feb 9 19:27:17.339000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:27:17.344586 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:27:17.344838 systemd[1]: Stopped audit-rules.service. Feb 9 19:27:17.346939 kernel: kauditd_printk_skb: 185 callbacks suppressed Feb 9 19:27:17.347008 kernel: audit: type=1305 audit(1707506837.339:169): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:27:17.347812 systemd[1]: Starting audit-rules.service... Feb 9 19:27:17.339000 audit[1328]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd3755530 a2=420 a3=0 items=0 ppid=1 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:17.385261 augenrules[1345]: No rules Feb 9 19:27:17.386477 systemd[1]: Finished audit-rules.service. Feb 9 19:27:17.392387 kernel: audit: type=1300 audit(1707506837.339:169): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd3755530 a2=420 a3=0 items=0 ppid=1 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:17.339000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:27:17.394305 sudo[1324]: pam_unix(sudo:session): session closed for user root Feb 9 19:27:17.402127 kernel: audit: type=1327 audit(1707506837.339:169): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:27:17.402249 kernel: audit: type=1131 audit(1707506837.343:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:17.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:17.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:17.424186 kernel: audit: type=1130 audit(1707506837.385:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:17.450060 kernel: audit: type=1106 audit(1707506837.393:172): pid=1324 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:27:17.393000 audit[1324]: USER_END pid=1324 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:27:17.449012 sshd[1321]: pam_unix(sshd:session): session closed for user core Feb 9 19:27:17.454368 systemd-logind[1129]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:27:17.456888 systemd[1]: sshd@5-10.128.0.111:22-147.75.109.163:58306.service: Deactivated successfully. Feb 9 19:27:17.457958 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:27:17.459976 systemd-logind[1129]: Removed session 6. Feb 9 19:27:17.393000 audit[1324]: CRED_DISP pid=1324 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:27:17.493868 kernel: audit: type=1104 audit(1707506837.393:173): pid=1324 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:27:17.531899 kernel: audit: type=1106 audit(1707506837.449:174): pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:27:17.449000 audit[1321]: USER_END pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:27:17.449000 audit[1321]: CRED_DISP pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:27:17.494344 systemd[1]: Started sshd@6-10.128.0.111:22-147.75.109.163:58312.service. Feb 9 19:27:17.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.111:22-147.75.109.163:58306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:17.557212 kernel: audit: type=1104 audit(1707506837.449:175): pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:27:17.557279 kernel: audit: type=1131 audit(1707506837.455:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.111:22-147.75.109.163:58306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:17.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.111:22-147.75.109.163:58312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:17.786000 audit[1351]: USER_ACCT pid=1351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:27:17.789197 sshd[1351]: Accepted publickey for core from 147.75.109.163 port 58312 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:27:17.788000 audit[1351]: CRED_ACQ pid=1351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:27:17.788000 audit[1351]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff08f94410 a2=3 a3=0 items=0 ppid=1 pid=1351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:17.788000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:27:17.790613 sshd[1351]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:27:17.797286 systemd[1]: Started session-7.scope. Feb 9 19:27:17.797895 systemd-logind[1129]: New session 7 of user core. Feb 9 19:27:17.804000 audit[1351]: USER_START pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:27:17.806000 audit[1353]: CRED_ACQ pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:27:17.962000 audit[1354]: USER_ACCT pid=1354 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:27:17.963800 sudo[1354]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:27:17.962000 audit[1354]: CRED_REFR pid=1354 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:27:17.964210 sudo[1354]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:27:17.965000 audit[1354]: USER_START pid=1354 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:27:18.758080 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:27:18.766870 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:27:18.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:18.767462 systemd[1]: Reached target network-online.target. Feb 9 19:27:18.769552 systemd[1]: Starting docker.service... Feb 9 19:27:18.819553 env[1370]: time="2024-02-09T19:27:18.819498720Z" level=info msg="Starting up" Feb 9 19:27:18.821759 env[1370]: time="2024-02-09T19:27:18.821696998Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:27:18.821759 env[1370]: time="2024-02-09T19:27:18.821728477Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:27:18.821759 env[1370]: time="2024-02-09T19:27:18.821756712Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:27:18.821996 env[1370]: time="2024-02-09T19:27:18.821771847Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:27:18.828153 env[1370]: time="2024-02-09T19:27:18.828114886Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:27:18.828378 env[1370]: time="2024-02-09T19:27:18.828354604Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:27:18.828490 env[1370]: time="2024-02-09T19:27:18.828468449Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:27:18.828579 env[1370]: time="2024-02-09T19:27:18.828562363Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:27:18.837838 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3907818851-merged.mount: Deactivated successfully. Feb 9 19:27:18.891544 env[1370]: time="2024-02-09T19:27:18.891490442Z" level=info msg="Loading containers: start." Feb 9 19:27:18.963000 audit[1401]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:18.963000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd1dbe3640 a2=0 a3=7ffd1dbe362c items=0 ppid=1370 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:18.963000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 19:27:18.966000 audit[1403]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:18.966000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc4a9b40f0 a2=0 a3=7ffc4a9b40dc items=0 ppid=1370 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:18.966000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 19:27:18.969000 audit[1405]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:18.969000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdf8f24680 a2=0 a3=7ffdf8f2466c items=0 ppid=1370 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:18.969000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:27:18.972000 audit[1407]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:18.972000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe6d1c7ac0 a2=0 a3=7ffe6d1c7aac items=0 ppid=1370 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:18.972000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:27:18.976000 audit[1409]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:18.976000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc4f5319f0 a2=0 a3=7ffc4f5319dc items=0 ppid=1370 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:18.976000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 19:27:18.995000 audit[1414]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:18.995000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff9af90c80 a2=0 a3=7fff9af90c6c items=0 ppid=1370 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:18.995000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 19:27:19.007000 audit[1416]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.007000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd6835a320 a2=0 a3=7ffd6835a30c items=0 ppid=1370 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.007000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 19:27:19.010000 audit[1418]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.010000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdec3cb3a0 a2=0 a3=7ffdec3cb38c items=0 ppid=1370 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.010000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 19:27:19.013000 audit[1420]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.013000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe05b636e0 a2=0 a3=7ffe05b636cc items=0 ppid=1370 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.013000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:27:19.026000 audit[1424]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.026000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd5e9c1bd0 a2=0 a3=7ffd5e9c1bbc items=0 ppid=1370 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.026000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:27:19.028000 audit[1425]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.028000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff79fd37d0 a2=0 a3=7fff79fd37bc items=0 ppid=1370 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.028000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:27:19.044240 kernel: Initializing XFRM netlink socket Feb 9 19:27:19.089151 env[1370]: time="2024-02-09T19:27:19.089096128Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 19:27:19.123000 audit[1433]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.123000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff05c277a0 a2=0 a3=7fff05c2778c items=0 ppid=1370 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.123000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 19:27:19.136000 audit[1436]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.136000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffee3180b10 a2=0 a3=7ffee3180afc items=0 ppid=1370 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.136000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 19:27:19.140000 audit[1439]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.140000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd12e94020 a2=0 a3=7ffd12e9400c items=0 ppid=1370 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.140000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 19:27:19.143000 audit[1441]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.143000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc0cfe9c70 a2=0 a3=7ffc0cfe9c5c items=0 ppid=1370 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.143000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 19:27:19.146000 audit[1443]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.146000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffc7425cb0 a2=0 a3=7fffc7425c9c items=0 ppid=1370 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.146000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 19:27:19.149000 audit[1445]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.149000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd56116a00 a2=0 a3=7ffd561169ec items=0 ppid=1370 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.149000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 19:27:19.153000 audit[1447]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.153000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe95aa5c50 a2=0 a3=7ffe95aa5c3c items=0 ppid=1370 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.153000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 19:27:19.164000 audit[1450]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.164000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc82cc6500 a2=0 a3=7ffc82cc64ec items=0 ppid=1370 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.164000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 19:27:19.168000 audit[1452]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.168000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe46956c60 a2=0 a3=7ffe46956c4c items=0 ppid=1370 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.168000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:27:19.171000 audit[1454]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.171000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffefc7d4660 a2=0 a3=7ffefc7d464c items=0 ppid=1370 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.171000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:27:19.174000 audit[1456]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.174000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdad187ff0 a2=0 a3=7ffdad187fdc items=0 ppid=1370 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.174000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 19:27:19.176379 systemd-networkd[1027]: docker0: Link UP Feb 9 19:27:19.189000 audit[1460]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.189000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeda360080 a2=0 a3=7ffeda36006c items=0 ppid=1370 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.189000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:27:19.191000 audit[1461]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:19.191000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc2ecfcd10 a2=0 a3=7ffc2ecfccfc items=0 ppid=1370 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:19.191000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:27:19.192939 env[1370]: time="2024-02-09T19:27:19.192890999Z" level=info msg="Loading containers: done." Feb 9 19:27:19.213211 env[1370]: time="2024-02-09T19:27:19.213119818Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 19:27:19.213526 env[1370]: time="2024-02-09T19:27:19.213476091Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 19:27:19.213650 env[1370]: time="2024-02-09T19:27:19.213625653Z" level=info msg="Daemon has completed initialization" Feb 9 19:27:19.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:19.236241 systemd[1]: Started docker.service. Feb 9 19:27:19.249545 env[1370]: time="2024-02-09T19:27:19.249465869Z" level=info msg="API listen on /run/docker.sock" Feb 9 19:27:19.275433 systemd[1]: Reloading. Feb 9 19:27:19.408641 /usr/lib/systemd/system-generators/torcx-generator[1510]: time="2024-02-09T19:27:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:27:19.408828 /usr/lib/systemd/system-generators/torcx-generator[1510]: time="2024-02-09T19:27:19Z" level=info msg="torcx already run" Feb 9 19:27:19.500559 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:27:19.500586 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:27:19.528488 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:27:19.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.611000 audit: BPF prog-id=37 op=LOAD Feb 9 19:27:19.611000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:27:19.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.613000 audit: BPF prog-id=38 op=LOAD Feb 9 19:27:19.613000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:27:19.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.614000 audit: BPF prog-id=39 op=LOAD Feb 9 19:27:19.614000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:27:19.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.615000 audit: BPF prog-id=40 op=LOAD Feb 9 19:27:19.615000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:27:19.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit: BPF prog-id=41 op=LOAD Feb 9 19:27:19.617000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit: BPF prog-id=42 op=LOAD Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit: BPF prog-id=43 op=LOAD Feb 9 19:27:19.617000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:27:19.617000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit: BPF prog-id=44 op=LOAD Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.617000 audit: BPF prog-id=45 op=LOAD Feb 9 19:27:19.617000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:27:19.618000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:27:19.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit: BPF prog-id=46 op=LOAD Feb 9 19:27:19.620000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit: BPF prog-id=47 op=LOAD Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.620000 audit: BPF prog-id=48 op=LOAD Feb 9 19:27:19.620000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:27:19.620000 audit: BPF prog-id=20 op=UNLOAD Feb 9 19:27:19.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit: BPF prog-id=49 op=LOAD Feb 9 19:27:19.623000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit: BPF prog-id=50 op=LOAD Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.623000 audit: BPF prog-id=51 op=LOAD Feb 9 19:27:19.623000 audit: BPF prog-id=30 op=UNLOAD Feb 9 19:27:19.623000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.625000 audit: BPF prog-id=52 op=LOAD Feb 9 19:27:19.625000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.626000 audit: BPF prog-id=53 op=LOAD Feb 9 19:27:19.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:19.626000 audit: BPF prog-id=54 op=LOAD Feb 9 19:27:19.626000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:27:19.626000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:27:19.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:19.671212 systemd[1]: Started kubelet.service. Feb 9 19:27:19.763036 kubelet[1552]: E0209 19:27:19.762960 1552 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 19:27:19.766138 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:27:19.766382 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:27:19.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:27:20.301002 env[1144]: time="2024-02-09T19:27:20.300925260Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\"" Feb 9 19:27:20.762404 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2895592673.mount: Deactivated successfully. Feb 9 19:27:22.704739 env[1144]: time="2024-02-09T19:27:22.704663063Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:22.707840 env[1144]: time="2024-02-09T19:27:22.707787196Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:22.710297 env[1144]: time="2024-02-09T19:27:22.710248112Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:22.712555 env[1144]: time="2024-02-09T19:27:22.712516443Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:22.713511 env[1144]: time="2024-02-09T19:27:22.713455581Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\" returns image reference \"sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47\"" Feb 9 19:27:22.727655 env[1144]: time="2024-02-09T19:27:22.727604448Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\"" Feb 9 19:27:24.555637 env[1144]: time="2024-02-09T19:27:24.555558526Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:24.558307 env[1144]: time="2024-02-09T19:27:24.558258644Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:24.560723 env[1144]: time="2024-02-09T19:27:24.560675868Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:24.563068 env[1144]: time="2024-02-09T19:27:24.563025104Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:24.564096 env[1144]: time="2024-02-09T19:27:24.564040544Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\" returns image reference \"sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c\"" Feb 9 19:27:24.580016 env[1144]: time="2024-02-09T19:27:24.579952565Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\"" Feb 9 19:27:25.761455 env[1144]: time="2024-02-09T19:27:25.761379852Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:25.764214 env[1144]: time="2024-02-09T19:27:25.764151148Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:25.766702 env[1144]: time="2024-02-09T19:27:25.766660542Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:25.769136 env[1144]: time="2024-02-09T19:27:25.769094086Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:25.770070 env[1144]: time="2024-02-09T19:27:25.770016793Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\" returns image reference \"sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe\"" Feb 9 19:27:25.783923 env[1144]: time="2024-02-09T19:27:25.783883387Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 9 19:27:26.767781 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount346463978.mount: Deactivated successfully. Feb 9 19:27:27.441305 env[1144]: time="2024-02-09T19:27:27.441225494Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:27.447275 env[1144]: time="2024-02-09T19:27:27.447223055Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:27.449997 env[1144]: time="2024-02-09T19:27:27.449949385Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:27.452041 env[1144]: time="2024-02-09T19:27:27.451997222Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:27.453014 env[1144]: time="2024-02-09T19:27:27.452969736Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 9 19:27:27.467751 env[1144]: time="2024-02-09T19:27:27.467706007Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 19:27:27.816718 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2514496308.mount: Deactivated successfully. Feb 9 19:27:27.826124 env[1144]: time="2024-02-09T19:27:27.826059119Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:27.829134 env[1144]: time="2024-02-09T19:27:27.829079339Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:27.831510 env[1144]: time="2024-02-09T19:27:27.831462402Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:27.833939 env[1144]: time="2024-02-09T19:27:27.833892233Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:27.834724 env[1144]: time="2024-02-09T19:27:27.834671126Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 19:27:27.849624 env[1144]: time="2024-02-09T19:27:27.849565207Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Feb 9 19:27:28.242746 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4251022101.mount: Deactivated successfully. Feb 9 19:27:29.804387 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 19:27:29.804718 systemd[1]: Stopped kubelet.service. Feb 9 19:27:29.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:29.813055 kernel: kauditd_printk_skb: 293 callbacks suppressed Feb 9 19:27:29.813224 kernel: audit: type=1130 audit(1707506849.803:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:29.836754 systemd[1]: Started kubelet.service. Feb 9 19:27:29.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:29.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:29.882843 kernel: audit: type=1131 audit(1707506849.803:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:29.883021 kernel: audit: type=1130 audit(1707506849.835:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:29.949514 kubelet[1597]: E0209 19:27:29.949456 1597 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 19:27:29.955280 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:27:29.955514 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:27:29.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:27:29.978224 kernel: audit: type=1131 audit(1707506849.954:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:27:33.080227 env[1144]: time="2024-02-09T19:27:33.080118715Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:33.084108 env[1144]: time="2024-02-09T19:27:33.084049880Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:33.087918 env[1144]: time="2024-02-09T19:27:33.087866772Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:33.092262 env[1144]: time="2024-02-09T19:27:33.092200875Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:33.092866 env[1144]: time="2024-02-09T19:27:33.092804991Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Feb 9 19:27:33.109977 env[1144]: time="2024-02-09T19:27:33.109905300Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 19:27:33.487369 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount563819972.mount: Deactivated successfully. Feb 9 19:27:34.291635 env[1144]: time="2024-02-09T19:27:34.291559415Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:34.294711 env[1144]: time="2024-02-09T19:27:34.294641706Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:34.296795 env[1144]: time="2024-02-09T19:27:34.296752422Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:34.298913 env[1144]: time="2024-02-09T19:27:34.298869281Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:34.299712 env[1144]: time="2024-02-09T19:27:34.299631415Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 9 19:27:35.619579 kernel: audit: type=1131 audit(1707506855.594:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:35.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:35.595371 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 9 19:27:35.640000 audit: BPF prog-id=43 op=UNLOAD Feb 9 19:27:35.656987 kernel: audit: type=1334 audit(1707506855.640:425): prog-id=43 op=UNLOAD Feb 9 19:27:35.657091 kernel: audit: type=1334 audit(1707506855.640:426): prog-id=42 op=UNLOAD Feb 9 19:27:35.640000 audit: BPF prog-id=42 op=UNLOAD Feb 9 19:27:35.640000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:27:35.665212 kernel: audit: type=1334 audit(1707506855.640:427): prog-id=41 op=UNLOAD Feb 9 19:27:39.179565 systemd[1]: Stopped kubelet.service. Feb 9 19:27:39.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:39.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:39.210591 systemd[1]: Reloading. Feb 9 19:27:39.226192 kernel: audit: type=1130 audit(1707506859.179:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:39.226347 kernel: audit: type=1131 audit(1707506859.179:429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:39.316767 /usr/lib/systemd/system-generators/torcx-generator[1695]: time="2024-02-09T19:27:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:27:39.317605 /usr/lib/systemd/system-generators/torcx-generator[1695]: time="2024-02-09T19:27:39Z" level=info msg="torcx already run" Feb 9 19:27:39.424839 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:27:39.424869 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:27:39.452057 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:27:39.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.556367 kernel: audit: type=1400 audit(1707506859.533:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.556439 kernel: audit: type=1400 audit(1707506859.533:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.598358 kernel: audit: type=1400 audit(1707506859.539:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.598503 kernel: audit: type=1400 audit(1707506859.539:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.597000 audit: BPF prog-id=55 op=LOAD Feb 9 19:27:39.597000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:27:39.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.617000 audit: BPF prog-id=56 op=LOAD Feb 9 19:27:39.617000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:27:39.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.618000 audit: BPF prog-id=57 op=LOAD Feb 9 19:27:39.618000 audit: BPF prog-id=39 op=UNLOAD Feb 9 19:27:39.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.619000 audit: BPF prog-id=58 op=LOAD Feb 9 19:27:39.619000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit: BPF prog-id=59 op=LOAD Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.621000 audit: BPF prog-id=60 op=LOAD Feb 9 19:27:39.621000 audit: BPF prog-id=44 op=UNLOAD Feb 9 19:27:39.621000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:27:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.623000 audit: BPF prog-id=61 op=LOAD Feb 9 19:27:39.624000 audit: BPF prog-id=46 op=UNLOAD Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit: BPF prog-id=62 op=LOAD Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.624000 audit: BPF prog-id=63 op=LOAD Feb 9 19:27:39.624000 audit: BPF prog-id=47 op=UNLOAD Feb 9 19:27:39.624000 audit: BPF prog-id=48 op=UNLOAD Feb 9 19:27:39.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit: BPF prog-id=64 op=LOAD Feb 9 19:27:39.627000 audit: BPF prog-id=49 op=UNLOAD Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit: BPF prog-id=65 op=LOAD Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.627000 audit: BPF prog-id=66 op=LOAD Feb 9 19:27:39.627000 audit: BPF prog-id=50 op=UNLOAD Feb 9 19:27:39.627000 audit: BPF prog-id=51 op=UNLOAD Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit: BPF prog-id=67 op=LOAD Feb 9 19:27:39.629000 audit: BPF prog-id=52 op=UNLOAD Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit: BPF prog-id=68 op=LOAD Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:39.630000 audit: BPF prog-id=69 op=LOAD Feb 9 19:27:39.630000 audit: BPF prog-id=53 op=UNLOAD Feb 9 19:27:39.630000 audit: BPF prog-id=54 op=UNLOAD Feb 9 19:27:39.664552 systemd[1]: Started kubelet.service. Feb 9 19:27:39.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:39.754548 kubelet[1737]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:27:39.755024 kubelet[1737]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 19:27:39.755109 kubelet[1737]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:27:39.755351 kubelet[1737]: I0209 19:27:39.755301 1737 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:27:40.210424 kubelet[1737]: I0209 19:27:40.210370 1737 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 19:27:40.210424 kubelet[1737]: I0209 19:27:40.210424 1737 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:27:40.211901 kubelet[1737]: I0209 19:27:40.211857 1737 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 19:27:40.220365 kubelet[1737]: E0209 19:27:40.220332 1737 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.111:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:40.220630 kubelet[1737]: I0209 19:27:40.220609 1737 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:27:40.228476 kubelet[1737]: I0209 19:27:40.228436 1737 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:27:40.228866 kubelet[1737]: I0209 19:27:40.228826 1737 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:27:40.229133 kubelet[1737]: I0209 19:27:40.229076 1737 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 19:27:40.229133 kubelet[1737]: I0209 19:27:40.229111 1737 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 19:27:40.229133 kubelet[1737]: I0209 19:27:40.229126 1737 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 19:27:40.229467 kubelet[1737]: I0209 19:27:40.229289 1737 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:27:40.229467 kubelet[1737]: I0209 19:27:40.229421 1737 kubelet.go:393] "Attempting to sync node with API server" Feb 9 19:27:40.229467 kubelet[1737]: I0209 19:27:40.229445 1737 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:27:40.229611 kubelet[1737]: I0209 19:27:40.229483 1737 kubelet.go:309] "Adding apiserver pod source" Feb 9 19:27:40.229611 kubelet[1737]: I0209 19:27:40.229522 1737 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:27:40.234870 kubelet[1737]: W0209 19:27:40.234797 1737 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.111:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:40.234870 kubelet[1737]: E0209 19:27:40.234868 1737 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.111:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:40.235076 kubelet[1737]: I0209 19:27:40.234989 1737 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:27:40.236794 kubelet[1737]: W0209 19:27:40.236742 1737 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.111:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:40.237073 kubelet[1737]: E0209 19:27:40.237052 1737 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.111:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:40.237992 kubelet[1737]: W0209 19:27:40.237953 1737 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:27:40.238770 kubelet[1737]: I0209 19:27:40.238741 1737 server.go:1232] "Started kubelet" Feb 9 19:27:40.239000 audit[1737]: AVC avc: denied { mac_admin } for pid=1737 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:40.239000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:27:40.240692 kubelet[1737]: E0209 19:27:40.240396 1737 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal.17b24871501221df", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", UID:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 27, 40, 238709215, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 27, 40, 238709215, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal"}': 'Post "https://10.128.0.111:6443/api/v1/namespaces/default/events": dial tcp 10.128.0.111:6443: connect: connection refused'(may retry after sleeping) Feb 9 19:27:40.239000 audit[1737]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aeab70 a1=c000accb70 a2=c000aeab40 a3=25 items=0 ppid=1 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:40.241070 kubelet[1737]: E0209 19:27:40.240961 1737 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:27:40.241070 kubelet[1737]: E0209 19:27:40.240999 1737 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:27:40.239000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:27:40.241470 kubelet[1737]: I0209 19:27:40.241451 1737 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:27:40.240000 audit[1737]: AVC avc: denied { mac_admin } for pid=1737 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:40.240000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:27:40.240000 audit[1737]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ad4580 a1=c000accb88 a2=c000aeac00 a3=25 items=0 ppid=1 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:40.240000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:27:40.242260 kubelet[1737]: I0209 19:27:40.242241 1737 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:27:40.242533 kubelet[1737]: I0209 19:27:40.242515 1737 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:27:40.242727 kubelet[1737]: I0209 19:27:40.242286 1737 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 19:27:40.242998 kubelet[1737]: I0209 19:27:40.242973 1737 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 19:27:40.243086 kubelet[1737]: I0209 19:27:40.242315 1737 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:27:40.244059 kubelet[1737]: I0209 19:27:40.244028 1737 server.go:462] "Adding debug handlers to kubelet server" Feb 9 19:27:40.248320 kubelet[1737]: I0209 19:27:40.247980 1737 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 19:27:40.248000 audit[1747]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:40.248000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc8ff5c7d0 a2=0 a3=7ffc8ff5c7bc items=0 ppid=1737 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:40.248000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:27:40.251329 kubelet[1737]: I0209 19:27:40.250711 1737 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:27:40.251329 kubelet[1737]: I0209 19:27:40.250804 1737 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 19:27:40.252002 kubelet[1737]: W0209 19:27:40.251923 1737 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.111:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:40.252122 kubelet[1737]: E0209 19:27:40.252018 1737 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.111:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:40.252975 kubelet[1737]: E0209 19:27:40.252940 1737 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" not found" Feb 9 19:27:40.253384 kubelet[1737]: E0209 19:27:40.253358 1737 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.111:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.111:6443: connect: connection refused" interval="200ms" Feb 9 19:27:40.252000 audit[1748]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:40.252000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3ffed580 a2=0 a3=7ffd3ffed56c items=0 ppid=1737 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:40.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:27:40.257000 audit[1750]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:40.257000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc9aa1c5f0 a2=0 a3=7ffc9aa1c5dc items=0 ppid=1737 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:40.257000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:27:40.262000 audit[1752]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:40.262000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe6a101ac0 a2=0 a3=7ffe6a101aac items=0 ppid=1737 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:40.262000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:27:40.279000 audit[1756]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:40.279000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffca4ea8aa0 a2=0 a3=7ffca4ea8a8c items=0 ppid=1737 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:40.279000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:27:40.297272 kubelet[1737]: I0209 19:27:40.297232 1737 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 19:27:40.298000 audit[1759]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:27:40.298000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff3e068f60 a2=0 a3=7fff3e068f4c items=0 ppid=1737 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:40.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:27:40.301000 audit[1760]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:40.301000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe4f8eca20 a2=0 a3=7ffe4f8eca0c items=0 ppid=1737 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:40.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:27:40.303000 audit[1761]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:40.303000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffead309180 a2=0 a3=7ffead30916c items=0 ppid=1737 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:40.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:27:40.305000 audit[1762]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:27:40.305000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca5c28a80 a2=0 a3=7ffca5c28a6c items=0 ppid=1737 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:40.305000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:27:40.307638 kubelet[1737]: I0209 19:27:40.307585 1737 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 19:27:40.307835 kubelet[1737]: I0209 19:27:40.307815 1737 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 19:27:40.308073 kubelet[1737]: I0209 19:27:40.308049 1737 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 19:27:40.308294 kubelet[1737]: E0209 19:27:40.308276 1737 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:27:40.309907 kubelet[1737]: I0209 19:27:40.309875 1737 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:27:40.309907 kubelet[1737]: I0209 19:27:40.309908 1737 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:27:40.310065 kubelet[1737]: I0209 19:27:40.309929 1737 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:27:40.309000 audit[1763]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:27:40.309000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4e34ec80 a2=0 a3=7fff4e34ec6c items=0 ppid=1737 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:40.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:27:40.311000 audit[1764]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:27:40.311000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdae782ff0 a2=0 a3=7ffdae782fdc items=0 ppid=1737 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:40.311000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:27:40.313000 audit[1765]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:27:40.313000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe1c21ced0 a2=0 a3=7ffe1c21cebc items=0 ppid=1737 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:40.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:27:40.315329 kubelet[1737]: W0209 19:27:40.315265 1737 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.111:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:40.315463 kubelet[1737]: E0209 19:27:40.315344 1737 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.111:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:40.360519 kubelet[1737]: I0209 19:27:40.360302 1737 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:40.416668 kubelet[1737]: E0209 19:27:40.360818 1737 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.111:6443/api/v1/nodes\": dial tcp 10.128.0.111:6443: connect: connection refused" node="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:40.416668 kubelet[1737]: E0209 19:27:40.409017 1737 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 19:27:40.418885 kubelet[1737]: I0209 19:27:40.418834 1737 policy_none.go:49] "None policy: Start" Feb 9 19:27:40.420904 kubelet[1737]: I0209 19:27:40.420850 1737 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:27:40.420904 kubelet[1737]: I0209 19:27:40.420896 1737 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:27:40.454770 kubelet[1737]: E0209 19:27:40.454706 1737 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.111:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.111:6443: connect: connection refused" interval="400ms" Feb 9 19:27:40.616380 kubelet[1737]: I0209 19:27:40.566886 1737 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:40.616380 kubelet[1737]: E0209 19:27:40.567435 1737 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.111:6443/api/v1/nodes\": dial tcp 10.128.0.111:6443: connect: connection refused" node="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:40.616773 kubelet[1737]: E0209 19:27:40.616703 1737 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 19:27:40.621210 systemd[1]: Created slice kubepods.slice. Feb 9 19:27:40.628519 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:27:40.633628 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:27:40.640221 kubelet[1737]: I0209 19:27:40.640186 1737 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:27:40.639000 audit[1737]: AVC avc: denied { mac_admin } for pid=1737 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:40.657964 kernel: kauditd_printk_skb: 213 callbacks suppressed Feb 9 19:27:40.658125 kernel: audit: type=1400 audit(1707506860.639:617): avc: denied { mac_admin } for pid=1737 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:40.658191 kubelet[1737]: I0209 19:27:40.646302 1737 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:27:40.658191 kubelet[1737]: I0209 19:27:40.646619 1737 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:27:40.658191 kubelet[1737]: E0209 19:27:40.647889 1737 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" not found" Feb 9 19:27:40.639000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:27:40.678938 kernel: audit: type=1401 audit(1707506860.639:617): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:27:40.639000 audit[1737]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004eb6b0 a1=c000a6ca08 a2=c0004eb680 a3=25 items=0 ppid=1 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:40.679318 kernel: audit: type=1300 audit(1707506860.639:617): arch=c000003e syscall=188 success=no exit=-22 a0=c0004eb6b0 a1=c000a6ca08 a2=c0004eb680 a3=25 items=0 ppid=1 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:40.711894 kernel: audit: type=1327 audit(1707506860.639:617): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:27:40.639000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:27:40.855727 kubelet[1737]: E0209 19:27:40.855633 1737 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.111:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.111:6443: connect: connection refused" interval="800ms" Feb 9 19:27:40.973240 kubelet[1737]: I0209 19:27:40.973101 1737 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:40.973805 kubelet[1737]: E0209 19:27:40.973559 1737 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.111:6443/api/v1/nodes\": dial tcp 10.128.0.111:6443: connect: connection refused" node="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:41.018145 kubelet[1737]: I0209 19:27:41.017913 1737 topology_manager.go:215] "Topology Admit Handler" podUID="2dc9f3ab34588e30e2f2a30de5247135" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:41.024579 kubelet[1737]: I0209 19:27:41.024534 1737 topology_manager.go:215] "Topology Admit Handler" podUID="a0338fb77527ae9633368e112d5db8f4" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:41.029033 kubelet[1737]: I0209 19:27:41.029002 1737 topology_manager.go:215] "Topology Admit Handler" podUID="d316287c6e3082d214ad19cffe7c76ba" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:41.035434 systemd[1]: Created slice kubepods-burstable-pod2dc9f3ab34588e30e2f2a30de5247135.slice. Feb 9 19:27:41.054678 systemd[1]: Created slice kubepods-burstable-poda0338fb77527ae9633368e112d5db8f4.slice. Feb 9 19:27:41.056593 kubelet[1737]: I0209 19:27:41.056555 1737 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2dc9f3ab34588e30e2f2a30de5247135-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"2dc9f3ab34588e30e2f2a30de5247135\") " pod="kube-system/kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:41.056915 kubelet[1737]: I0209 19:27:41.056892 1737 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2dc9f3ab34588e30e2f2a30de5247135-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"2dc9f3ab34588e30e2f2a30de5247135\") " pod="kube-system/kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:41.058096 kubelet[1737]: I0209 19:27:41.057441 1737 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a0338fb77527ae9633368e112d5db8f4-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"a0338fb77527ae9633368e112d5db8f4\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:41.058096 kubelet[1737]: I0209 19:27:41.057509 1737 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a0338fb77527ae9633368e112d5db8f4-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"a0338fb77527ae9633368e112d5db8f4\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:41.058096 kubelet[1737]: I0209 19:27:41.057557 1737 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a0338fb77527ae9633368e112d5db8f4-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"a0338fb77527ae9633368e112d5db8f4\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:41.058096 kubelet[1737]: I0209 19:27:41.057598 1737 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2dc9f3ab34588e30e2f2a30de5247135-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"2dc9f3ab34588e30e2f2a30de5247135\") " pod="kube-system/kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:41.058412 kubelet[1737]: I0209 19:27:41.057639 1737 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a0338fb77527ae9633368e112d5db8f4-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"a0338fb77527ae9633368e112d5db8f4\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:41.058412 kubelet[1737]: I0209 19:27:41.057688 1737 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a0338fb77527ae9633368e112d5db8f4-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"a0338fb77527ae9633368e112d5db8f4\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:41.058412 kubelet[1737]: I0209 19:27:41.057731 1737 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d316287c6e3082d214ad19cffe7c76ba-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"d316287c6e3082d214ad19cffe7c76ba\") " pod="kube-system/kube-scheduler-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:41.069495 systemd[1]: Created slice kubepods-burstable-podd316287c6e3082d214ad19cffe7c76ba.slice. Feb 9 19:27:41.240030 kubelet[1737]: W0209 19:27:41.239846 1737 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.111:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:41.240030 kubelet[1737]: E0209 19:27:41.239933 1737 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.111:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:41.344922 kubelet[1737]: W0209 19:27:41.344760 1737 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.111:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:41.345253 kubelet[1737]: E0209 19:27:41.344980 1737 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.111:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:41.353122 env[1144]: time="2024-02-09T19:27:41.353055438Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal,Uid:2dc9f3ab34588e30e2f2a30de5247135,Namespace:kube-system,Attempt:0,}" Feb 9 19:27:41.361125 env[1144]: time="2024-02-09T19:27:41.361057044Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal,Uid:a0338fb77527ae9633368e112d5db8f4,Namespace:kube-system,Attempt:0,}" Feb 9 19:27:41.374647 env[1144]: time="2024-02-09T19:27:41.374585030Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal,Uid:d316287c6e3082d214ad19cffe7c76ba,Namespace:kube-system,Attempt:0,}" Feb 9 19:27:41.656816 kubelet[1737]: E0209 19:27:41.656763 1737 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.111:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.111:6443: connect: connection refused" interval="1.6s" Feb 9 19:27:41.665604 kubelet[1737]: W0209 19:27:41.665527 1737 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.111:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:41.665604 kubelet[1737]: E0209 19:27:41.665594 1737 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.111:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:41.779007 kubelet[1737]: I0209 19:27:41.778972 1737 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:41.779556 kubelet[1737]: E0209 19:27:41.779522 1737 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.111:6443/api/v1/nodes\": dial tcp 10.128.0.111:6443: connect: connection refused" node="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:41.818509 kubelet[1737]: W0209 19:27:41.818416 1737 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.111:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:41.818691 kubelet[1737]: E0209 19:27:41.818544 1737 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.111:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:42.282964 kubelet[1737]: E0209 19:27:42.282899 1737 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.111:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:42.478920 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4133980825.mount: Deactivated successfully. Feb 9 19:27:42.498350 env[1144]: time="2024-02-09T19:27:42.498281331Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:42.506735 env[1144]: time="2024-02-09T19:27:42.506679381Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:42.508603 env[1144]: time="2024-02-09T19:27:42.508542895Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:42.511431 env[1144]: time="2024-02-09T19:27:42.511373579Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:42.513992 env[1144]: time="2024-02-09T19:27:42.513927342Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:42.515303 env[1144]: time="2024-02-09T19:27:42.515249821Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:42.516581 env[1144]: time="2024-02-09T19:27:42.516542966Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:42.521655 env[1144]: time="2024-02-09T19:27:42.521586414Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:42.522952 env[1144]: time="2024-02-09T19:27:42.522900545Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:42.524210 env[1144]: time="2024-02-09T19:27:42.524150675Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:42.527550 env[1144]: time="2024-02-09T19:27:42.527495223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:42.537044 env[1144]: time="2024-02-09T19:27:42.536891444Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:27:42.582059 env[1144]: time="2024-02-09T19:27:42.581961644Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:27:42.582255 env[1144]: time="2024-02-09T19:27:42.582092970Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:27:42.582255 env[1144]: time="2024-02-09T19:27:42.582155319Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:27:42.582534 env[1144]: time="2024-02-09T19:27:42.582416453Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/57eb820aee9f620c578c477107c30f09936376b2a925a4dba532ba2695c83ed9 pid=1783 runtime=io.containerd.runc.v2 Feb 9 19:27:42.583386 env[1144]: time="2024-02-09T19:27:42.583304127Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:27:42.583386 env[1144]: time="2024-02-09T19:27:42.583360881Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:27:42.583633 env[1144]: time="2024-02-09T19:27:42.583581283Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:27:42.583950 env[1144]: time="2024-02-09T19:27:42.583888566Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ac3d511812bc3ea158c8680a2f8f3caa2b6c64c5a200b36c04a4280aacda5bdc pid=1776 runtime=io.containerd.runc.v2 Feb 9 19:27:42.606935 env[1144]: time="2024-02-09T19:27:42.606801519Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:27:42.607263 env[1144]: time="2024-02-09T19:27:42.607216370Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:27:42.607472 env[1144]: time="2024-02-09T19:27:42.607423600Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:27:42.607841 env[1144]: time="2024-02-09T19:27:42.607789012Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/422b08bfeccbc06bcb4ec6b04ae933f0f72b336c50699c65dfcceeacd43f5664 pid=1817 runtime=io.containerd.runc.v2 Feb 9 19:27:42.612797 systemd[1]: Started cri-containerd-ac3d511812bc3ea158c8680a2f8f3caa2b6c64c5a200b36c04a4280aacda5bdc.scope. Feb 9 19:27:42.650163 systemd[1]: Started cri-containerd-422b08bfeccbc06bcb4ec6b04ae933f0f72b336c50699c65dfcceeacd43f5664.scope. Feb 9 19:27:42.659642 systemd[1]: Started cri-containerd-57eb820aee9f620c578c477107c30f09936376b2a925a4dba532ba2695c83ed9.scope. Feb 9 19:27:42.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.688373 kernel: audit: type=1400 audit(1707506862.665:618): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.713217 kernel: audit: type=1400 audit(1707506862.665:619): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.741209 kernel: audit: type=1400 audit(1707506862.665:620): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.775582 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:27:42.775786 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:27:42.775829 kernel: audit: type=1400 audit(1707506862.665:621): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.665000 audit: BPF prog-id=70 op=LOAD Feb 9 19:27:42.666000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.666000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1776 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163336435313138313262633365613135386338363830613266386633 Feb 9 19:27:42.666000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.666000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1776 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163336435313138313262633365613135386338363830613266386633 Feb 9 19:27:42.666000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.666000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.666000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.666000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.666000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.666000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.666000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.666000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.666000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.666000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.666000 audit: BPF prog-id=71 op=LOAD Feb 9 19:27:42.666000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000380f00 items=0 ppid=1776 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163336435313138313262633365613135386338363830613266386633 Feb 9 19:27:42.686000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.686000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.686000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.686000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.686000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.686000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.686000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.686000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.739000 audit: BPF prog-id=72 op=LOAD Feb 9 19:27:42.740000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.740000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1817 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432326230386266656363626330366263623465633662303461653933 Feb 9 19:27:42.740000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.740000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1817 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432326230386266656363626330366263623465633662303461653933 Feb 9 19:27:42.740000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.740000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.740000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.740000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.740000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.740000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.740000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.740000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.740000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.686000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.740000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d01f0 items=0 ppid=1817 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432326230386266656363626330366263623465633662303461653933 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit: BPF prog-id=75 op=LOAD Feb 9 19:27:42.777000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d0238 items=0 ppid=1817 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432326230386266656363626330366263623465633662303461653933 Feb 9 19:27:42.777000 audit: BPF prog-id=75 op=UNLOAD Feb 9 19:27:42.777000 audit: BPF prog-id=73 op=UNLOAD Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.777000 audit: BPF prog-id=76 op=LOAD Feb 9 19:27:42.777000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d0648 items=0 ppid=1817 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432326230386266656363626330366263623465633662303461653933 Feb 9 19:27:42.686000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c20f8 items=0 ppid=1776 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163336435313138313262633365613135386338363830613266386633 Feb 9 19:27:42.783000 audit: BPF prog-id=74 op=UNLOAD Feb 9 19:27:42.783000 audit: BPF prog-id=71 op=UNLOAD Feb 9 19:27:42.784000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.784000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.784000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.784000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.784000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.784000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.784000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.784000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.784000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.784000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.784000 audit: BPF prog-id=77 op=LOAD Feb 9 19:27:42.784000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c2508 items=0 ppid=1776 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163336435313138313262633365613135386338363830613266386633 Feb 9 19:27:42.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.800000 audit: BPF prog-id=78 op=LOAD Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=1783 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537656238323061656539663632306335373863343737313037633330 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001196b0 a2=3c a3=c items=0 ppid=1783 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537656238323061656539663632306335373863343737313037633330 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit: BPF prog-id=79 op=LOAD Feb 9 19:27:42.801000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001199d8 a2=78 a3=c000290f00 items=0 ppid=1783 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537656238323061656539663632306335373863343737313037633330 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.801000 audit: BPF prog-id=80 op=LOAD Feb 9 19:27:42.801000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000119770 a2=78 a3=c000290f48 items=0 ppid=1783 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537656238323061656539663632306335373863343737313037633330 Feb 9 19:27:42.801000 audit: BPF prog-id=80 op=UNLOAD Feb 9 19:27:42.801000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:27:42.802000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.802000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.802000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.802000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.802000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.802000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.802000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.802000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.802000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.802000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.802000 audit: BPF prog-id=81 op=LOAD Feb 9 19:27:42.802000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000119c30 a2=78 a3=c000291358 items=0 ppid=1783 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537656238323061656539663632306335373863343737313037633330 Feb 9 19:27:42.840626 env[1144]: time="2024-02-09T19:27:42.840563803Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal,Uid:2dc9f3ab34588e30e2f2a30de5247135,Namespace:kube-system,Attempt:0,} returns sandbox id \"422b08bfeccbc06bcb4ec6b04ae933f0f72b336c50699c65dfcceeacd43f5664\"" Feb 9 19:27:42.848677 kubelet[1737]: E0209 19:27:42.848641 1737 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-21291" Feb 9 19:27:42.855304 env[1144]: time="2024-02-09T19:27:42.855248634Z" level=info msg="CreateContainer within sandbox \"422b08bfeccbc06bcb4ec6b04ae933f0f72b336c50699c65dfcceeacd43f5664\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 19:27:42.880521 env[1144]: time="2024-02-09T19:27:42.880439952Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal,Uid:a0338fb77527ae9633368e112d5db8f4,Namespace:kube-system,Attempt:0,} returns sandbox id \"ac3d511812bc3ea158c8680a2f8f3caa2b6c64c5a200b36c04a4280aacda5bdc\"" Feb 9 19:27:42.884455 kubelet[1737]: E0209 19:27:42.883864 1737 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flat" Feb 9 19:27:42.887586 env[1144]: time="2024-02-09T19:27:42.887511396Z" level=info msg="CreateContainer within sandbox \"422b08bfeccbc06bcb4ec6b04ae933f0f72b336c50699c65dfcceeacd43f5664\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"9ca6d9cf0f2439de7e91f554c9655b5e2a1eeb973d589c6e7658747722d89a20\"" Feb 9 19:27:42.888655 env[1144]: time="2024-02-09T19:27:42.888200674Z" level=info msg="CreateContainer within sandbox \"ac3d511812bc3ea158c8680a2f8f3caa2b6c64c5a200b36c04a4280aacda5bdc\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 19:27:42.889927 env[1144]: time="2024-02-09T19:27:42.889887634Z" level=info msg="StartContainer for \"9ca6d9cf0f2439de7e91f554c9655b5e2a1eeb973d589c6e7658747722d89a20\"" Feb 9 19:27:42.899839 env[1144]: time="2024-02-09T19:27:42.899779599Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal,Uid:d316287c6e3082d214ad19cffe7c76ba,Namespace:kube-system,Attempt:0,} returns sandbox id \"57eb820aee9f620c578c477107c30f09936376b2a925a4dba532ba2695c83ed9\"" Feb 9 19:27:42.903113 kubelet[1737]: E0209 19:27:42.902915 1737 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-21291" Feb 9 19:27:42.905974 env[1144]: time="2024-02-09T19:27:42.905863894Z" level=info msg="CreateContainer within sandbox \"57eb820aee9f620c578c477107c30f09936376b2a925a4dba532ba2695c83ed9\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 19:27:42.926151 systemd[1]: Started cri-containerd-9ca6d9cf0f2439de7e91f554c9655b5e2a1eeb973d589c6e7658747722d89a20.scope. Feb 9 19:27:42.936651 env[1144]: time="2024-02-09T19:27:42.936600734Z" level=info msg="CreateContainer within sandbox \"ac3d511812bc3ea158c8680a2f8f3caa2b6c64c5a200b36c04a4280aacda5bdc\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"434fc407a26edbda75c0c1ff8cd026235c3c073b460c6a3103094c9c31bd0291\"" Feb 9 19:27:42.937456 env[1144]: time="2024-02-09T19:27:42.937418440Z" level=info msg="StartContainer for \"434fc407a26edbda75c0c1ff8cd026235c3c073b460c6a3103094c9c31bd0291\"" Feb 9 19:27:42.944085 env[1144]: time="2024-02-09T19:27:42.944032799Z" level=info msg="CreateContainer within sandbox \"57eb820aee9f620c578c477107c30f09936376b2a925a4dba532ba2695c83ed9\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"38f6954853ae86d44e22efaf1d4b89112eb3f21ddf6da657cd2f86d662cfc969\"" Feb 9 19:27:42.944953 env[1144]: time="2024-02-09T19:27:42.944913750Z" level=info msg="StartContainer for \"38f6954853ae86d44e22efaf1d4b89112eb3f21ddf6da657cd2f86d662cfc969\"" Feb 9 19:27:42.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.959000 audit: BPF prog-id=82 op=LOAD Feb 9 19:27:42.960000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.960000 audit[1906]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1817 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963613664396366306632343339646537653931663535346339363535 Feb 9 19:27:42.960000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.960000 audit[1906]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1817 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963613664396366306632343339646537653931663535346339363535 Feb 9 19:27:42.960000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.960000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.960000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.960000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.960000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.960000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.960000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.960000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.960000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.960000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.960000 audit: BPF prog-id=83 op=LOAD Feb 9 19:27:42.960000 audit[1906]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002a8d10 items=0 ppid=1817 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963613664396366306632343339646537653931663535346339363535 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit: BPF prog-id=84 op=LOAD Feb 9 19:27:42.961000 audit[1906]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002a8d58 items=0 ppid=1817 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963613664396366306632343339646537653931663535346339363535 Feb 9 19:27:42.961000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:27:42.961000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:42.961000 audit: BPF prog-id=85 op=LOAD Feb 9 19:27:42.961000 audit[1906]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002a9168 items=0 ppid=1817 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:42.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963613664396366306632343339646537653931663535346339363535 Feb 9 19:27:42.994222 systemd[1]: Started cri-containerd-38f6954853ae86d44e22efaf1d4b89112eb3f21ddf6da657cd2f86d662cfc969.scope. Feb 9 19:27:43.007035 systemd[1]: Started cri-containerd-434fc407a26edbda75c0c1ff8cd026235c3c073b460c6a3103094c9c31bd0291.scope. Feb 9 19:27:43.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.029000 audit: BPF prog-id=86 op=LOAD Feb 9 19:27:43.033000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.033000 audit[1942]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1783 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:43.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663639353438353361653836643434653232656661663164346238 Feb 9 19:27:43.033000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.033000 audit[1942]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1783 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:43.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663639353438353361653836643434653232656661663164346238 Feb 9 19:27:43.034000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.034000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.034000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.034000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.034000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.034000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.034000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.034000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.034000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.034000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.034000 audit: BPF prog-id=87 op=LOAD Feb 9 19:27:43.034000 audit[1942]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d6450 items=0 ppid=1783 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:43.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663639353438353361653836643434653232656661663164346238 Feb 9 19:27:43.036000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.036000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.036000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.036000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.036000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.036000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.036000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.036000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.036000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.036000 audit: BPF prog-id=88 op=LOAD Feb 9 19:27:43.036000 audit[1942]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d6498 items=0 ppid=1783 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:43.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663639353438353361653836643434653232656661663164346238 Feb 9 19:27:43.037000 audit: BPF prog-id=88 op=UNLOAD Feb 9 19:27:43.037000 audit: BPF prog-id=87 op=UNLOAD Feb 9 19:27:43.037000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.037000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.037000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.037000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.037000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.037000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.037000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.037000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.037000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.037000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.037000 audit: BPF prog-id=89 op=LOAD Feb 9 19:27:43.037000 audit[1942]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d68a8 items=0 ppid=1783 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:43.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663639353438353361653836643434653232656661663164346238 Feb 9 19:27:43.053001 env[1144]: time="2024-02-09T19:27:43.052874671Z" level=info msg="StartContainer for \"9ca6d9cf0f2439de7e91f554c9655b5e2a1eeb973d589c6e7658747722d89a20\" returns successfully" Feb 9 19:27:43.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.063000 audit: BPF prog-id=90 op=LOAD Feb 9 19:27:43.064000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.064000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1776 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:43.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433346663343037613236656462646137356330633166663863643032 Feb 9 19:27:43.065000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.065000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1776 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:43.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433346663343037613236656462646137356330633166663863643032 Feb 9 19:27:43.065000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.065000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.065000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.065000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.065000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.065000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.065000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.065000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.065000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.065000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.065000 audit: BPF prog-id=91 op=LOAD Feb 9 19:27:43.065000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003cc520 items=0 ppid=1776 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:43.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433346663343037613236656462646137356330633166663863643032 Feb 9 19:27:43.066000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.066000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.066000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.066000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.066000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.066000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.066000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.066000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.066000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.066000 audit: BPF prog-id=92 op=LOAD Feb 9 19:27:43.066000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003cc568 items=0 ppid=1776 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:43.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433346663343037613236656462646137356330633166663863643032 Feb 9 19:27:43.067000 audit: BPF prog-id=92 op=UNLOAD Feb 9 19:27:43.067000 audit: BPF prog-id=91 op=UNLOAD Feb 9 19:27:43.067000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.067000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.067000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.067000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.067000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.067000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.067000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.067000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.067000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.067000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:43.067000 audit: BPF prog-id=93 op=LOAD Feb 9 19:27:43.067000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003cc978 items=0 ppid=1776 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:43.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433346663343037613236656462646137356330633166663863643032 Feb 9 19:27:43.099322 kubelet[1737]: W0209 19:27:43.094145 1737 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.111:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:43.099322 kubelet[1737]: E0209 19:27:43.099287 1737 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.111:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.111:6443: connect: connection refused Feb 9 19:27:43.112135 env[1144]: time="2024-02-09T19:27:43.112017268Z" level=info msg="StartContainer for \"38f6954853ae86d44e22efaf1d4b89112eb3f21ddf6da657cd2f86d662cfc969\" returns successfully" Feb 9 19:27:43.181026 env[1144]: time="2024-02-09T19:27:43.180945384Z" level=info msg="StartContainer for \"434fc407a26edbda75c0c1ff8cd026235c3c073b460c6a3103094c9c31bd0291\" returns successfully" Feb 9 19:27:43.258087 kubelet[1737]: E0209 19:27:43.257993 1737 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.111:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.111:6443: connect: connection refused" interval="3.2s" Feb 9 19:27:43.387390 kubelet[1737]: I0209 19:27:43.386527 1737 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:46.408830 kernel: kauditd_printk_skb: 342 callbacks suppressed Feb 9 19:27:46.409071 kernel: audit: type=1400 audit(1707506866.375:726): avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:27:46.375000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:27:46.375000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000838090 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:27:46.375000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:27:46.476984 kernel: audit: type=1300 audit(1707506866.375:726): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000838090 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:27:46.477159 kernel: audit: type=1327 audit(1707506866.375:726): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:27:46.408000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:27:46.408000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0001e0dc0 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:27:46.537843 kernel: audit: type=1400 audit(1707506866.408:727): avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:27:46.538000 kernel: audit: type=1300 audit(1707506866.408:727): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0001e0dc0 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:27:46.408000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:27:46.569205 kernel: audit: type=1327 audit(1707506866.408:727): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:27:46.569371 kernel: audit: type=1400 audit(1707506866.527:728): avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:27:46.527000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:27:46.527000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00400cab0 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:27:46.631936 kernel: audit: type=1300 audit(1707506866.527:728): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00400cab0 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:27:46.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:27:46.676225 kernel: audit: type=1327 audit(1707506866.527:728): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:27:46.527000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:27:46.527000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0070ad380 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:27:46.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:27:46.527000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:27:46.527000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00400cc30 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:27:46.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:27:46.565000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:27:46.709195 kernel: audit: type=1400 audit(1707506866.527:729): avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:27:46.565000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c0042c2330 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:27:46.565000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:27:46.571000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:27:46.571000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c0067cdcc0 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:27:46.571000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:27:46.576000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:27:46.576000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c0042c3a40 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:27:46.576000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:27:46.875696 kubelet[1737]: E0209 19:27:46.875654 1737 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" not found" node="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:46.919052 kubelet[1737]: I0209 19:27:46.918995 1737 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:46.976751 kubelet[1737]: E0209 19:27:46.976512 1737 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal.17b24871501221df", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", UID:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 27, 40, 238709215, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 27, 40, 238709215, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal"}': 'namespaces "default" not found' (will not retry!) Feb 9 19:27:47.240403 kubelet[1737]: I0209 19:27:47.240258 1737 apiserver.go:52] "Watching apiserver" Feb 9 19:27:47.251970 kubelet[1737]: I0209 19:27:47.251926 1737 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:27:49.283282 systemd[1]: Reloading. Feb 9 19:27:49.402962 /usr/lib/systemd/system-generators/torcx-generator[2031]: time="2024-02-09T19:27:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:27:49.406818 /usr/lib/systemd/system-generators/torcx-generator[2031]: time="2024-02-09T19:27:49Z" level=info msg="torcx already run" Feb 9 19:27:49.520568 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:27:49.520596 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:27:49.548478 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:27:49.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.663000 audit: BPF prog-id=94 op=LOAD Feb 9 19:27:49.663000 audit: BPF prog-id=55 op=UNLOAD Feb 9 19:27:49.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.665000 audit: BPF prog-id=95 op=LOAD Feb 9 19:27:49.665000 audit: BPF prog-id=78 op=UNLOAD Feb 9 19:27:49.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.668000 audit: BPF prog-id=96 op=LOAD Feb 9 19:27:49.668000 audit: BPF prog-id=56 op=UNLOAD Feb 9 19:27:49.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.670000 audit: BPF prog-id=97 op=LOAD Feb 9 19:27:49.670000 audit: BPF prog-id=57 op=UNLOAD Feb 9 19:27:49.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.671000 audit: BPF prog-id=98 op=LOAD Feb 9 19:27:49.671000 audit: BPF prog-id=58 op=UNLOAD Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit: BPF prog-id=99 op=LOAD Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.672000 audit: BPF prog-id=100 op=LOAD Feb 9 19:27:49.672000 audit: BPF prog-id=59 op=UNLOAD Feb 9 19:27:49.672000 audit: BPF prog-id=60 op=UNLOAD Feb 9 19:27:49.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.673000 audit: BPF prog-id=101 op=LOAD Feb 9 19:27:49.673000 audit: BPF prog-id=72 op=UNLOAD Feb 9 19:27:49.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.675000 audit: BPF prog-id=102 op=LOAD Feb 9 19:27:49.675000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:27:49.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit: BPF prog-id=103 op=LOAD Feb 9 19:27:49.677000 audit: BPF prog-id=61 op=UNLOAD Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit: BPF prog-id=104 op=LOAD Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.677000 audit: BPF prog-id=105 op=LOAD Feb 9 19:27:49.677000 audit: BPF prog-id=62 op=UNLOAD Feb 9 19:27:49.677000 audit: BPF prog-id=63 op=UNLOAD Feb 9 19:27:49.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit: BPF prog-id=106 op=LOAD Feb 9 19:27:49.680000 audit: BPF prog-id=64 op=UNLOAD Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit: BPF prog-id=107 op=LOAD Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.680000 audit: BPF prog-id=108 op=LOAD Feb 9 19:27:49.680000 audit: BPF prog-id=65 op=UNLOAD Feb 9 19:27:49.680000 audit: BPF prog-id=66 op=UNLOAD Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit: BPF prog-id=109 op=LOAD Feb 9 19:27:49.682000 audit: BPF prog-id=67 op=UNLOAD Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.683000 audit: BPF prog-id=110 op=LOAD Feb 9 19:27:49.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.683000 audit: BPF prog-id=111 op=LOAD Feb 9 19:27:49.683000 audit: BPF prog-id=68 op=UNLOAD Feb 9 19:27:49.683000 audit: BPF prog-id=69 op=UNLOAD Feb 9 19:27:49.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.687000 audit: BPF prog-id=112 op=LOAD Feb 9 19:27:49.687000 audit: BPF prog-id=86 op=UNLOAD Feb 9 19:27:49.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.690000 audit: BPF prog-id=113 op=LOAD Feb 9 19:27:49.690000 audit: BPF prog-id=70 op=UNLOAD Feb 9 19:27:49.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.692000 audit: BPF prog-id=114 op=LOAD Feb 9 19:27:49.692000 audit: BPF prog-id=90 op=UNLOAD Feb 9 19:27:49.715414 systemd[1]: Stopping kubelet.service... Feb 9 19:27:49.738651 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 19:27:49.738945 systemd[1]: Stopped kubelet.service. Feb 9 19:27:49.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:49.739042 systemd[1]: kubelet.service: Consumed 1.010s CPU time. Feb 9 19:27:49.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:49.742821 systemd[1]: Started kubelet.service. Feb 9 19:27:49.873933 kubelet[2075]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:27:49.873933 kubelet[2075]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 19:27:49.873933 kubelet[2075]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:27:49.874539 kubelet[2075]: I0209 19:27:49.874021 2075 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:27:49.881704 kubelet[2075]: I0209 19:27:49.881662 2075 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 19:27:49.881704 kubelet[2075]: I0209 19:27:49.881709 2075 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:27:49.881990 kubelet[2075]: I0209 19:27:49.881976 2075 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 19:27:49.884922 kubelet[2075]: I0209 19:27:49.884886 2075 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 19:27:49.889358 kubelet[2075]: I0209 19:27:49.889331 2075 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:27:49.906061 kubelet[2075]: I0209 19:27:49.906025 2075 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:27:49.907263 kubelet[2075]: I0209 19:27:49.907239 2075 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:27:49.907832 kubelet[2075]: I0209 19:27:49.907795 2075 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 19:27:49.908026 kubelet[2075]: I0209 19:27:49.907840 2075 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 19:27:49.908026 kubelet[2075]: I0209 19:27:49.907859 2075 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 19:27:49.908026 kubelet[2075]: I0209 19:27:49.907907 2075 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:27:49.908026 kubelet[2075]: I0209 19:27:49.908019 2075 kubelet.go:393] "Attempting to sync node with API server" Feb 9 19:27:49.908292 kubelet[2075]: I0209 19:27:49.908046 2075 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:27:49.908292 kubelet[2075]: I0209 19:27:49.908089 2075 kubelet.go:309] "Adding apiserver pod source" Feb 9 19:27:49.908292 kubelet[2075]: I0209 19:27:49.908117 2075 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:27:49.915239 kubelet[2075]: I0209 19:27:49.909558 2075 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:27:49.917946 kubelet[2075]: I0209 19:27:49.917900 2075 server.go:1232] "Started kubelet" Feb 9 19:27:49.923000 audit[2075]: AVC avc: denied { mac_admin } for pid=2075 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.923000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:27:49.923000 audit[2075]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009fb950 a1=c000b8cea0 a2=c0009fb920 a3=25 items=0 ppid=1 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:49.923000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:27:49.923000 audit[2075]: AVC avc: denied { mac_admin } for pid=2075 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:49.923000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:27:49.923000 audit[2075]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009d90c0 a1=c000b8ceb8 a2=c0009fb9e0 a3=25 items=0 ppid=1 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:49.923000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:27:49.925656 kubelet[2075]: I0209 19:27:49.923619 2075 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:27:49.925656 kubelet[2075]: I0209 19:27:49.923690 2075 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:27:49.925656 kubelet[2075]: I0209 19:27:49.923748 2075 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:27:49.937036 kubelet[2075]: I0209 19:27:49.937004 2075 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:27:49.945114 kubelet[2075]: I0209 19:27:49.945084 2075 server.go:462] "Adding debug handlers to kubelet server" Feb 9 19:27:49.950311 kubelet[2075]: E0209 19:27:49.950275 2075 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:27:49.950458 kubelet[2075]: E0209 19:27:49.950320 2075 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:27:49.950703 kubelet[2075]: I0209 19:27:49.950668 2075 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 19:27:49.951229 kubelet[2075]: I0209 19:27:49.951211 2075 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 19:27:49.960940 kubelet[2075]: I0209 19:27:49.960898 2075 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 19:27:49.961686 kubelet[2075]: I0209 19:27:49.961658 2075 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:27:49.961977 kubelet[2075]: I0209 19:27:49.961965 2075 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 19:27:50.015234 kubelet[2075]: I0209 19:27:50.015198 2075 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 19:27:50.018639 kubelet[2075]: I0209 19:27:50.018611 2075 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 19:27:50.018843 kubelet[2075]: I0209 19:27:50.018826 2075 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 19:27:50.018983 kubelet[2075]: I0209 19:27:50.018968 2075 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 19:27:50.019138 kubelet[2075]: E0209 19:27:50.019124 2075 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:27:50.085587 kubelet[2075]: I0209 19:27:50.085553 2075 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:50.117991 kubelet[2075]: I0209 19:27:50.117959 2075 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:27:50.118255 kubelet[2075]: I0209 19:27:50.118238 2075 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:27:50.118371 kubelet[2075]: I0209 19:27:50.118359 2075 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:27:50.118658 kubelet[2075]: I0209 19:27:50.118642 2075 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 19:27:50.118796 kubelet[2075]: I0209 19:27:50.118782 2075 state_mem.go:96] "Updated CPUSet assignments" assignments={} Feb 9 19:27:50.118895 kubelet[2075]: I0209 19:27:50.118883 2075 policy_none.go:49] "None policy: Start" Feb 9 19:27:50.119431 kubelet[2075]: E0209 19:27:50.119411 2075 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 19:27:50.120056 kubelet[2075]: I0209 19:27:50.120037 2075 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:27:50.120217 kubelet[2075]: I0209 19:27:50.120203 2075 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:27:50.120490 kubelet[2075]: I0209 19:27:50.120476 2075 state_mem.go:75] "Updated machine memory state" Feb 9 19:27:50.129203 kubelet[2075]: I0209 19:27:50.129079 2075 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:27:50.129000 audit[2075]: AVC avc: denied { mac_admin } for pid=2075 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:27:50.129000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:27:50.129000 audit[2075]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b79920 a1=c000e05308 a2=c000b798f0 a3=25 items=0 ppid=1 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:27:50.129000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:27:50.129910 kubelet[2075]: I0209 19:27:50.129886 2075 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:27:50.130340 kubelet[2075]: I0209 19:27:50.130319 2075 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:27:50.147657 kubelet[2075]: I0209 19:27:50.147611 2075 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:50.147877 kubelet[2075]: I0209 19:27:50.147724 2075 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:50.258477 update_engine[1134]: I0209 19:27:50.258410 1134 update_attempter.cc:509] Updating boot flags... Feb 9 19:27:50.321477 kubelet[2075]: I0209 19:27:50.319836 2075 topology_manager.go:215] "Topology Admit Handler" podUID="2dc9f3ab34588e30e2f2a30de5247135" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:50.321477 kubelet[2075]: I0209 19:27:50.319980 2075 topology_manager.go:215] "Topology Admit Handler" podUID="a0338fb77527ae9633368e112d5db8f4" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:50.321477 kubelet[2075]: I0209 19:27:50.320038 2075 topology_manager.go:215] "Topology Admit Handler" podUID="d316287c6e3082d214ad19cffe7c76ba" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:50.342540 kubelet[2075]: W0209 19:27:50.341838 2075 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Feb 9 19:27:50.342540 kubelet[2075]: W0209 19:27:50.342319 2075 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Feb 9 19:27:50.342540 kubelet[2075]: W0209 19:27:50.342405 2075 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Feb 9 19:27:50.369459 kubelet[2075]: I0209 19:27:50.368641 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a0338fb77527ae9633368e112d5db8f4-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"a0338fb77527ae9633368e112d5db8f4\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:50.369459 kubelet[2075]: I0209 19:27:50.368726 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a0338fb77527ae9633368e112d5db8f4-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"a0338fb77527ae9633368e112d5db8f4\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:50.369459 kubelet[2075]: I0209 19:27:50.368792 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a0338fb77527ae9633368e112d5db8f4-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"a0338fb77527ae9633368e112d5db8f4\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:50.369459 kubelet[2075]: I0209 19:27:50.368888 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d316287c6e3082d214ad19cffe7c76ba-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"d316287c6e3082d214ad19cffe7c76ba\") " pod="kube-system/kube-scheduler-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:50.369843 kubelet[2075]: I0209 19:27:50.368946 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2dc9f3ab34588e30e2f2a30de5247135-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"2dc9f3ab34588e30e2f2a30de5247135\") " pod="kube-system/kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:50.369843 kubelet[2075]: I0209 19:27:50.369007 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2dc9f3ab34588e30e2f2a30de5247135-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"2dc9f3ab34588e30e2f2a30de5247135\") " pod="kube-system/kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:50.369843 kubelet[2075]: I0209 19:27:50.369067 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2dc9f3ab34588e30e2f2a30de5247135-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"2dc9f3ab34588e30e2f2a30de5247135\") " pod="kube-system/kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:50.369843 kubelet[2075]: I0209 19:27:50.369108 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a0338fb77527ae9633368e112d5db8f4-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"a0338fb77527ae9633368e112d5db8f4\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:50.370049 kubelet[2075]: I0209 19:27:50.369164 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a0338fb77527ae9633368e112d5db8f4-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal\" (UID: \"a0338fb77527ae9633368e112d5db8f4\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:27:50.520000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:27:50.520000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0000f3900 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:27:50.520000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:27:50.530000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:27:50.530000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:27:50.530000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cdf3a0 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:27:50.530000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:27:50.530000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00041e980 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:27:50.530000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:27:50.536000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:27:50.536000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00041f640 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:27:50.536000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:27:50.544000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 19:27:50.544000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ade6c0 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:27:50.544000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:27:50.912274 kubelet[2075]: I0209 19:27:50.912230 2075 apiserver.go:52] "Watching apiserver" Feb 9 19:27:50.962120 kubelet[2075]: I0209 19:27:50.962067 2075 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:27:51.109502 kubelet[2075]: I0209 19:27:51.109463 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" podStartSLOduration=1.109386664 podCreationTimestamp="2024-02-09 19:27:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:27:51.107310111 +0000 UTC m=+1.355396917" watchObservedRunningTime="2024-02-09 19:27:51.109386664 +0000 UTC m=+1.357473471" Feb 9 19:27:51.142846 kubelet[2075]: I0209 19:27:51.142792 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" podStartSLOduration=1.142739592 podCreationTimestamp="2024-02-09 19:27:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:27:51.127685509 +0000 UTC m=+1.375772312" watchObservedRunningTime="2024-02-09 19:27:51.142739592 +0000 UTC m=+1.390826389" Feb 9 19:27:51.158950 kubelet[2075]: I0209 19:27:51.158911 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" podStartSLOduration=1.158845831 podCreationTimestamp="2024-02-09 19:27:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:27:51.144346296 +0000 UTC m=+1.392433102" watchObservedRunningTime="2024-02-09 19:27:51.158845831 +0000 UTC m=+1.406932639" Feb 9 19:27:54.804036 sudo[1354]: pam_unix(sudo:session): session closed for user root Feb 9 19:27:54.802000 audit[1354]: USER_END pid=1354 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:27:54.809692 kernel: kauditd_printk_skb: 287 callbacks suppressed Feb 9 19:27:54.809813 kernel: audit: type=1106 audit(1707506874.802:988): pid=1354 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:27:54.804000 audit[1354]: CRED_DISP pid=1354 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:27:54.852687 sshd[1351]: pam_unix(sshd:session): session closed for user core Feb 9 19:27:54.857817 kernel: audit: type=1104 audit(1707506874.804:989): pid=1354 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:27:54.860954 systemd[1]: sshd@6-10.128.0.111:22-147.75.109.163:58312.service: Deactivated successfully. Feb 9 19:27:54.857000 audit[1351]: USER_END pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:27:54.862757 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:27:54.862991 systemd[1]: session-7.scope: Consumed 7.324s CPU time. Feb 9 19:27:54.863990 systemd-logind[1129]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:27:54.866031 systemd-logind[1129]: Removed session 7. Feb 9 19:27:54.857000 audit[1351]: CRED_DISP pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:27:54.919292 kernel: audit: type=1106 audit(1707506874.857:990): pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:27:54.919596 kernel: audit: type=1104 audit(1707506874.857:991): pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:27:54.919667 kernel: audit: type=1131 audit(1707506874.860:992): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.111:22-147.75.109.163:58312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:27:54.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.111:22-147.75.109.163:58312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:28:03.363750 kubelet[2075]: I0209 19:28:03.363707 2075 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 19:28:03.364895 env[1144]: time="2024-02-09T19:28:03.364743105Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:28:03.365403 kubelet[2075]: I0209 19:28:03.365038 2075 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 19:28:04.152978 kubelet[2075]: I0209 19:28:04.152921 2075 topology_manager.go:215] "Topology Admit Handler" podUID="ebc590d1-080a-4777-81b6-e76d32dde897" podNamespace="kube-system" podName="kube-proxy-fcvlk" Feb 9 19:28:04.160921 systemd[1]: Created slice kubepods-besteffort-podebc590d1_080a_4777_81b6_e76d32dde897.slice. Feb 9 19:28:04.258432 kubelet[2075]: I0209 19:28:04.258375 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ebc590d1-080a-4777-81b6-e76d32dde897-xtables-lock\") pod \"kube-proxy-fcvlk\" (UID: \"ebc590d1-080a-4777-81b6-e76d32dde897\") " pod="kube-system/kube-proxy-fcvlk" Feb 9 19:28:04.258681 kubelet[2075]: I0209 19:28:04.258452 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ebc590d1-080a-4777-81b6-e76d32dde897-lib-modules\") pod \"kube-proxy-fcvlk\" (UID: \"ebc590d1-080a-4777-81b6-e76d32dde897\") " pod="kube-system/kube-proxy-fcvlk" Feb 9 19:28:04.258681 kubelet[2075]: I0209 19:28:04.258488 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tmnj7\" (UniqueName: \"kubernetes.io/projected/ebc590d1-080a-4777-81b6-e76d32dde897-kube-api-access-tmnj7\") pod \"kube-proxy-fcvlk\" (UID: \"ebc590d1-080a-4777-81b6-e76d32dde897\") " pod="kube-system/kube-proxy-fcvlk" Feb 9 19:28:04.258681 kubelet[2075]: I0209 19:28:04.258527 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ebc590d1-080a-4777-81b6-e76d32dde897-kube-proxy\") pod \"kube-proxy-fcvlk\" (UID: \"ebc590d1-080a-4777-81b6-e76d32dde897\") " pod="kube-system/kube-proxy-fcvlk" Feb 9 19:28:04.414050 kubelet[2075]: I0209 19:28:04.413940 2075 topology_manager.go:215] "Topology Admit Handler" podUID="ed46a33c-4fee-45ff-9779-f0d7d8c842d2" podNamespace="tigera-operator" podName="tigera-operator-55585899bf-h6n2n" Feb 9 19:28:04.422259 systemd[1]: Created slice kubepods-besteffort-poded46a33c_4fee_45ff_9779_f0d7d8c842d2.slice. Feb 9 19:28:04.459935 kubelet[2075]: I0209 19:28:04.459876 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ed46a33c-4fee-45ff-9779-f0d7d8c842d2-var-lib-calico\") pod \"tigera-operator-55585899bf-h6n2n\" (UID: \"ed46a33c-4fee-45ff-9779-f0d7d8c842d2\") " pod="tigera-operator/tigera-operator-55585899bf-h6n2n" Feb 9 19:28:04.459935 kubelet[2075]: I0209 19:28:04.459943 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-djw8n\" (UniqueName: \"kubernetes.io/projected/ed46a33c-4fee-45ff-9779-f0d7d8c842d2-kube-api-access-djw8n\") pod \"tigera-operator-55585899bf-h6n2n\" (UID: \"ed46a33c-4fee-45ff-9779-f0d7d8c842d2\") " pod="tigera-operator/tigera-operator-55585899bf-h6n2n" Feb 9 19:28:04.470983 env[1144]: time="2024-02-09T19:28:04.470925664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fcvlk,Uid:ebc590d1-080a-4777-81b6-e76d32dde897,Namespace:kube-system,Attempt:0,}" Feb 9 19:28:04.498887 env[1144]: time="2024-02-09T19:28:04.498762004Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:28:04.499132 env[1144]: time="2024-02-09T19:28:04.498838836Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:28:04.499132 env[1144]: time="2024-02-09T19:28:04.498856969Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:28:04.499132 env[1144]: time="2024-02-09T19:28:04.499074946Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c319c2bf8ace39cfe755db52f899f4cf801b169da84f59eb97aaed0cca69d549 pid=2176 runtime=io.containerd.runc.v2 Feb 9 19:28:04.535976 systemd[1]: Started cri-containerd-c319c2bf8ace39cfe755db52f899f4cf801b169da84f59eb97aaed0cca69d549.scope. Feb 9 19:28:04.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574293 kernel: audit: type=1400 audit(1707506884.552:993): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.612687 kernel: audit: type=1400 audit(1707506884.552:994): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.632850 env[1144]: time="2024-02-09T19:28:04.632790926Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fcvlk,Uid:ebc590d1-080a-4777-81b6-e76d32dde897,Namespace:kube-system,Attempt:0,} returns sandbox id \"c319c2bf8ace39cfe755db52f899f4cf801b169da84f59eb97aaed0cca69d549\"" Feb 9 19:28:04.637128 env[1144]: time="2024-02-09T19:28:04.637078936Z" level=info msg="CreateContainer within sandbox \"c319c2bf8ace39cfe755db52f899f4cf801b169da84f59eb97aaed0cca69d549\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:28:04.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.658821 kernel: audit: type=1400 audit(1707506884.552:995): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.659034 kernel: audit: type=1400 audit(1707506884.552:996): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.681256 kernel: audit: type=1400 audit(1707506884.552:997): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.681408 kernel: audit: type=1400 audit(1707506884.552:998): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.722599 kernel: audit: type=1400 audit(1707506884.552:999): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.722773 kernel: audit: type=1400 audit(1707506884.552:1000): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.733650 env[1144]: time="2024-02-09T19:28:04.733596809Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-h6n2n,Uid:ed46a33c-4fee-45ff-9779-f0d7d8c842d2,Namespace:tigera-operator,Attempt:0,}" Feb 9 19:28:04.744082 kernel: audit: type=1400 audit(1707506884.552:1001): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.785095 kernel: audit: type=1400 audit(1707506884.573:1002): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.785376 env[1144]: time="2024-02-09T19:28:04.784485293Z" level=info msg="CreateContainer within sandbox \"c319c2bf8ace39cfe755db52f899f4cf801b169da84f59eb97aaed0cca69d549\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4794277e3696aca32d4d9965e092dc53ba117616ec7860c1cc1f69b8745515a3\"" Feb 9 19:28:04.787199 env[1144]: time="2024-02-09T19:28:04.785784763Z" level=info msg="StartContainer for \"4794277e3696aca32d4d9965e092dc53ba117616ec7860c1cc1f69b8745515a3\"" Feb 9 19:28:04.789531 env[1144]: time="2024-02-09T19:28:04.788816576Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:28:04.789531 env[1144]: time="2024-02-09T19:28:04.788910988Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:28:04.789531 env[1144]: time="2024-02-09T19:28:04.788963267Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:28:04.789531 env[1144]: time="2024-02-09T19:28:04.789344025Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/73356a3b2699066e3e4ef2d11e54652ad5a2095f61d01b24ff6e2bc52a980c13 pid=2220 runtime=io.containerd.runc.v2 Feb 9 19:28:04.573000 audit: BPF prog-id=115 op=LOAD Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2176 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:04.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333313963326266386163653339636665373535646235326638393966 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2176 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:04.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333313963326266386163653339636665373535646235326638393966 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit: BPF prog-id=116 op=LOAD Feb 9 19:28:04.574000 audit[2187]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000215550 items=0 ppid=2176 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:04.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333313963326266386163653339636665373535646235326638393966 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.574000 audit: BPF prog-id=117 op=LOAD Feb 9 19:28:04.574000 audit[2187]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000215598 items=0 ppid=2176 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:04.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333313963326266386163653339636665373535646235326638393966 Feb 9 19:28:04.574000 audit: BPF prog-id=117 op=UNLOAD Feb 9 19:28:04.575000 audit: BPF prog-id=116 op=UNLOAD Feb 9 19:28:04.575000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.575000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.575000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.575000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.575000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.575000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.575000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.575000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.575000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.575000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.575000 audit: BPF prog-id=118 op=LOAD Feb 9 19:28:04.575000 audit[2187]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002159a8 items=0 ppid=2176 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:04.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333313963326266386163653339636665373535646235326638393966 Feb 9 19:28:04.813086 systemd[1]: Started cri-containerd-73356a3b2699066e3e4ef2d11e54652ad5a2095f61d01b24ff6e2bc52a980c13.scope. Feb 9 19:28:04.828518 systemd[1]: Started cri-containerd-4794277e3696aca32d4d9965e092dc53ba117616ec7860c1cc1f69b8745515a3.scope. Feb 9 19:28:04.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.852000 audit: BPF prog-id=119 op=LOAD Feb 9 19:28:04.854000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.854000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2220 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:04.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733333536613362323639393036366533653465663264313165353436 Feb 9 19:28:04.855000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.855000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2220 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:04.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733333536613362323639393036366533653465663264313165353436 Feb 9 19:28:04.855000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.855000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.855000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.855000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.855000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.855000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.855000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.855000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.855000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.855000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.855000 audit: BPF prog-id=120 op=LOAD Feb 9 19:28:04.855000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003486f0 items=0 ppid=2220 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:04.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733333536613362323639393036366533653465663264313165353436 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit: BPF prog-id=121 op=LOAD Feb 9 19:28:04.856000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000348738 items=0 ppid=2220 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:04.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733333536613362323639393036366533653465663264313165353436 Feb 9 19:28:04.856000 audit: BPF prog-id=121 op=UNLOAD Feb 9 19:28:04.856000 audit: BPF prog-id=120 op=UNLOAD Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.856000 audit: BPF prog-id=122 op=LOAD Feb 9 19:28:04.856000 audit[2231]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000348b48 items=0 ppid=2220 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:04.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733333536613362323639393036366533653465663264313165353436 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2176 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:04.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437393432373765333639366163613332643464393936356530393264 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit: BPF prog-id=123 op=LOAD Feb 9 19:28:04.860000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000322f40 items=0 ppid=2176 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:04.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437393432373765333639366163613332643464393936356530393264 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.860000 audit: BPF prog-id=124 op=LOAD Feb 9 19:28:04.860000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000322f88 items=0 ppid=2176 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:04.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437393432373765333639366163613332643464393936356530393264 Feb 9 19:28:04.860000 audit: BPF prog-id=124 op=UNLOAD Feb 9 19:28:04.860000 audit: BPF prog-id=123 op=UNLOAD Feb 9 19:28:04.861000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.861000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.861000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.861000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.861000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.861000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.861000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.861000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.861000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.861000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:04.861000 audit: BPF prog-id=125 op=LOAD Feb 9 19:28:04.861000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000323018 items=0 ppid=2176 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:04.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437393432373765333639366163613332643464393936356530393264 Feb 9 19:28:04.886751 env[1144]: time="2024-02-09T19:28:04.886680272Z" level=info msg="StartContainer for \"4794277e3696aca32d4d9965e092dc53ba117616ec7860c1cc1f69b8745515a3\" returns successfully" Feb 9 19:28:04.927016 env[1144]: time="2024-02-09T19:28:04.926957233Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-h6n2n,Uid:ed46a33c-4fee-45ff-9779-f0d7d8c842d2,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"73356a3b2699066e3e4ef2d11e54652ad5a2095f61d01b24ff6e2bc52a980c13\"" Feb 9 19:28:04.932282 kubelet[2075]: E0209 19:28:04.931929 2075 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Feb 9 19:28:04.932729 env[1144]: time="2024-02-09T19:28:04.932687635Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 19:28:05.006000 audit[2313]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.006000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd834c8a0 a2=0 a3=7ffdd834c88c items=0 ppid=2259 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.006000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:28:05.008000 audit[2314]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.008000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd34822b40 a2=0 a3=7ffd34822b2c items=0 ppid=2259 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:28:05.010000 audit[2315]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.010000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc1df5300 a2=0 a3=7ffcc1df52ec items=0 ppid=2259 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:28:05.015000 audit[2316]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.015000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4febb5c0 a2=0 a3=7fff4febb5ac items=0 ppid=2259 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:28:05.017000 audit[2317]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.017000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff13cbaf90 a2=0 a3=7fff13cbaf7c items=0 ppid=2259 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.017000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:28:05.019000 audit[2318]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.019000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf434b7a0 a2=0 a3=7ffdf434b78c items=0 ppid=2259 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.019000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:28:05.107000 audit[2319]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.107000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc69f66870 a2=0 a3=7ffc69f6685c items=0 ppid=2259 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:28:05.112000 audit[2321]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.112000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd283b9ff0 a2=0 a3=7ffd283b9fdc items=0 ppid=2259 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:28:05.122072 kubelet[2075]: I0209 19:28:05.121819 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-fcvlk" podStartSLOduration=1.121765886 podCreationTimestamp="2024-02-09 19:28:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:28:05.11967165 +0000 UTC m=+15.367758455" watchObservedRunningTime="2024-02-09 19:28:05.121765886 +0000 UTC m=+15.369852694" Feb 9 19:28:05.122000 audit[2324]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.122000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff5dedb490 a2=0 a3=7fff5dedb47c items=0 ppid=2259 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.122000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:28:05.125000 audit[2325]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.125000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed3b4d9b0 a2=0 a3=7ffed3b4d99c items=0 ppid=2259 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.125000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:28:05.131000 audit[2327]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.131000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd270e2ac0 a2=0 a3=7ffd270e2aac items=0 ppid=2259 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:28:05.133000 audit[2328]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.133000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc620941b0 a2=0 a3=7ffc6209419c items=0 ppid=2259 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.133000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:28:05.139000 audit[2330]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.139000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd0b5a4f70 a2=0 a3=7ffd0b5a4f5c items=0 ppid=2259 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:28:05.145000 audit[2333]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.145000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff1001d150 a2=0 a3=7fff1001d13c items=0 ppid=2259 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:28:05.147000 audit[2334]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.147000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc4fb3430 a2=0 a3=7fffc4fb341c items=0 ppid=2259 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.147000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:28:05.151000 audit[2336]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.151000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff08b16eb0 a2=0 a3=7fff08b16e9c items=0 ppid=2259 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.151000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:28:05.153000 audit[2337]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.153000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff6dedb220 a2=0 a3=7fff6dedb20c items=0 ppid=2259 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.153000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:28:05.156000 audit[2339]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.156000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1d14a760 a2=0 a3=7ffe1d14a74c items=0 ppid=2259 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:28:05.162000 audit[2342]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.162000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd70df0da0 a2=0 a3=7ffd70df0d8c items=0 ppid=2259 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:28:05.169000 audit[2345]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.169000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5462e6a0 a2=0 a3=7ffe5462e68c items=0 ppid=2259 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:28:05.170000 audit[2346]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.170000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffee0eee640 a2=0 a3=7ffee0eee62c items=0 ppid=2259 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:28:05.174000 audit[2348]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.174000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffdc32b8f70 a2=0 a3=7ffdc32b8f5c items=0 ppid=2259 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:28:05.180000 audit[2351]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.180000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc086ff4c0 a2=0 a3=7ffc086ff4ac items=0 ppid=2259 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.180000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:28:05.183000 audit[2352]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.183000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5af547c0 a2=0 a3=7fff5af547ac items=0 ppid=2259 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:28:05.188000 audit[2354]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:28:05.188000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc48eda440 a2=0 a3=7ffc48eda42c items=0 ppid=2259 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:28:05.216000 audit[2360]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:05.216000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffef13a13c0 a2=0 a3=7ffef13a13ac items=0 ppid=2259 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.216000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:05.226000 audit[2360]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:05.226000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffef13a13c0 a2=0 a3=7ffef13a13ac items=0 ppid=2259 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:05.229000 audit[2366]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.229000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffbd2e55c0 a2=0 a3=7fffbd2e55ac items=0 ppid=2259 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.229000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:28:05.233000 audit[2368]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.233000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe2041b140 a2=0 a3=7ffe2041b12c items=0 ppid=2259 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:28:05.240000 audit[2371]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.240000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeef0df750 a2=0 a3=7ffeef0df73c items=0 ppid=2259 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.240000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:28:05.241000 audit[2372]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.241000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff48f07ce0 a2=0 a3=7fff48f07ccc items=0 ppid=2259 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:28:05.245000 audit[2374]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.245000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd637402d0 a2=0 a3=7ffd637402bc items=0 ppid=2259 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:28:05.247000 audit[2375]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.247000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc979e0500 a2=0 a3=7ffc979e04ec items=0 ppid=2259 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:28:05.250000 audit[2377]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.250000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe19931ba0 a2=0 a3=7ffe19931b8c items=0 ppid=2259 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.250000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:28:05.256000 audit[2380]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.256000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffff3339d10 a2=0 a3=7ffff3339cfc items=0 ppid=2259 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:28:05.258000 audit[2381]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.258000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4a33fd50 a2=0 a3=7fff4a33fd3c items=0 ppid=2259 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.258000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:28:05.262000 audit[2383]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.262000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc3282cfe0 a2=0 a3=7ffc3282cfcc items=0 ppid=2259 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:28:05.263000 audit[2384]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.263000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff786c5d10 a2=0 a3=7fff786c5cfc items=0 ppid=2259 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:28:05.267000 audit[2386]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.267000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2ac02520 a2=0 a3=7ffd2ac0250c items=0 ppid=2259 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.267000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:28:05.272000 audit[2389]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.272000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe7dd04f30 a2=0 a3=7ffe7dd04f1c items=0 ppid=2259 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:28:05.277000 audit[2392]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.277000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd662e8190 a2=0 a3=7ffd662e817c items=0 ppid=2259 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:28:05.279000 audit[2393]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.279000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe1c223f10 a2=0 a3=7ffe1c223efc items=0 ppid=2259 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.279000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:28:05.283000 audit[2395]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.283000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd3247d2e0 a2=0 a3=7ffd3247d2cc items=0 ppid=2259 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:28:05.289000 audit[2398]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.289000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcce012250 a2=0 a3=7ffcce01223c items=0 ppid=2259 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:28:05.292000 audit[2399]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.292000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4fb65960 a2=0 a3=7ffe4fb6594c items=0 ppid=2259 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:28:05.296000 audit[2401]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2401 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.296000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffd935c810 a2=0 a3=7fffd935c7fc items=0 ppid=2259 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:28:05.298000 audit[2402]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.298000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbaaee310 a2=0 a3=7ffdbaaee2fc items=0 ppid=2259 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:28:05.302000 audit[2404]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.302000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcbdbdb7c0 a2=0 a3=7ffcbdbdb7ac items=0 ppid=2259 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:28:05.307000 audit[2407]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:28:05.307000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd3ecc7860 a2=0 a3=7ffd3ecc784c items=0 ppid=2259 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:28:05.312000 audit[2409]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:28:05.312000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc77e77750 a2=0 a3=7ffc77e7773c items=0 ppid=2259 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.312000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:05.313000 audit[2409]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:28:05.313000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffc77e77750 a2=0 a3=7ffc77e7773c items=0 ppid=2259 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:05.313000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:05.395279 systemd[1]: run-containerd-runc-k8s.io-c319c2bf8ace39cfe755db52f899f4cf801b169da84f59eb97aaed0cca69d549-runc.k92rXk.mount: Deactivated successfully. Feb 9 19:28:07.038821 env[1144]: time="2024-02-09T19:28:07.038733690Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:07.043457 env[1144]: time="2024-02-09T19:28:07.043402683Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:07.048106 env[1144]: time="2024-02-09T19:28:07.048036545Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:07.053311 env[1144]: time="2024-02-09T19:28:07.053249229Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:07.053888 env[1144]: time="2024-02-09T19:28:07.053837312Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 9 19:28:07.059237 env[1144]: time="2024-02-09T19:28:07.059141968Z" level=info msg="CreateContainer within sandbox \"73356a3b2699066e3e4ef2d11e54652ad5a2095f61d01b24ff6e2bc52a980c13\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 19:28:07.081329 env[1144]: time="2024-02-09T19:28:07.075128293Z" level=info msg="CreateContainer within sandbox \"73356a3b2699066e3e4ef2d11e54652ad5a2095f61d01b24ff6e2bc52a980c13\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"0b0aec661e05957e639204e38ef6b9f7a8b511efe4fe44a55e8350eeeffe693c\"" Feb 9 19:28:07.081329 env[1144]: time="2024-02-09T19:28:07.076477723Z" level=info msg="StartContainer for \"0b0aec661e05957e639204e38ef6b9f7a8b511efe4fe44a55e8350eeeffe693c\"" Feb 9 19:28:07.110737 systemd[1]: Started cri-containerd-0b0aec661e05957e639204e38ef6b9f7a8b511efe4fe44a55e8350eeeffe693c.scope. Feb 9 19:28:07.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.139000 audit: BPF prog-id=126 op=LOAD Feb 9 19:28:07.140000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.140000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2220 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:07.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062306165633636316530353935376536333932303465333865663662 Feb 9 19:28:07.140000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.140000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2220 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:07.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062306165633636316530353935376536333932303465333865663662 Feb 9 19:28:07.141000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.141000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.141000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.141000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.141000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.141000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.141000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.141000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.141000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.141000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.141000 audit: BPF prog-id=127 op=LOAD Feb 9 19:28:07.141000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218a60 items=0 ppid=2220 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:07.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062306165633636316530353935376536333932303465333865663662 Feb 9 19:28:07.142000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.142000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.142000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.142000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.142000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.142000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.142000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.142000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.142000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.142000 audit: BPF prog-id=128 op=LOAD Feb 9 19:28:07.142000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218aa8 items=0 ppid=2220 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:07.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062306165633636316530353935376536333932303465333865663662 Feb 9 19:28:07.143000 audit: BPF prog-id=128 op=UNLOAD Feb 9 19:28:07.143000 audit: BPF prog-id=127 op=UNLOAD Feb 9 19:28:07.143000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.143000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.143000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.143000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.143000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.143000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.143000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.143000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.143000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.143000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:07.143000 audit: BPF prog-id=129 op=LOAD Feb 9 19:28:07.143000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218eb8 items=0 ppid=2220 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:07.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062306165633636316530353935376536333932303465333865663662 Feb 9 19:28:07.173739 env[1144]: time="2024-02-09T19:28:07.170833134Z" level=info msg="StartContainer for \"0b0aec661e05957e639204e38ef6b9f7a8b511efe4fe44a55e8350eeeffe693c\" returns successfully" Feb 9 19:28:09.178000 audit[2451]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:09.178000 audit[2451]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff7968f9f0 a2=0 a3=7fff7968f9dc items=0 ppid=2259 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:09.178000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:09.179000 audit[2451]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:09.179000 audit[2451]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fff7968f9f0 a2=0 a3=31030 items=0 ppid=2259 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:09.179000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:09.190000 audit[2453]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2453 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:09.190000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff674b3940 a2=0 a3=7fff674b392c items=0 ppid=2259 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:09.190000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:09.191000 audit[2453]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2453 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:09.191000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fff674b3940 a2=0 a3=31030 items=0 ppid=2259 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:09.191000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:09.321813 kubelet[2075]: I0209 19:28:09.321770 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-55585899bf-h6n2n" podStartSLOduration=3.194894889 podCreationTimestamp="2024-02-09 19:28:04 +0000 UTC" firstStartedPulling="2024-02-09 19:28:04.928902945 +0000 UTC m=+15.176989725" lastFinishedPulling="2024-02-09 19:28:07.055722314 +0000 UTC m=+17.303809113" observedRunningTime="2024-02-09 19:28:08.178181619 +0000 UTC m=+18.426268415" watchObservedRunningTime="2024-02-09 19:28:09.321714277 +0000 UTC m=+19.569801138" Feb 9 19:28:09.322866 kubelet[2075]: I0209 19:28:09.322838 2075 topology_manager.go:215] "Topology Admit Handler" podUID="7714d145-189b-45dc-991a-8187eea75689" podNamespace="calico-system" podName="calico-typha-bcd4ffcbf-hg7kh" Feb 9 19:28:09.330524 systemd[1]: Created slice kubepods-besteffort-pod7714d145_189b_45dc_991a_8187eea75689.slice. Feb 9 19:28:09.336581 kubelet[2075]: W0209 19:28:09.336551 2075 reflector.go:535] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal' and this object Feb 9 19:28:09.336872 kubelet[2075]: E0209 19:28:09.336847 2075 reflector.go:147] object-"calico-system"/"typha-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal' and this object Feb 9 19:28:09.336872 kubelet[2075]: W0209 19:28:09.336793 2075 reflector.go:535] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal' and this object Feb 9 19:28:09.337049 kubelet[2075]: E0209 19:28:09.336912 2075 reflector.go:147] object-"calico-system"/"tigera-ca-bundle": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal' and this object Feb 9 19:28:09.337049 kubelet[2075]: W0209 19:28:09.337026 2075 reflector.go:535] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal' and this object Feb 9 19:28:09.337049 kubelet[2075]: E0209 19:28:09.337044 2075 reflector.go:147] object-"calico-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal' and this object Feb 9 19:28:09.406276 kubelet[2075]: I0209 19:28:09.406237 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/7714d145-189b-45dc-991a-8187eea75689-typha-certs\") pod \"calico-typha-bcd4ffcbf-hg7kh\" (UID: \"7714d145-189b-45dc-991a-8187eea75689\") " pod="calico-system/calico-typha-bcd4ffcbf-hg7kh" Feb 9 19:28:09.406654 kubelet[2075]: I0209 19:28:09.406627 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7714d145-189b-45dc-991a-8187eea75689-tigera-ca-bundle\") pod \"calico-typha-bcd4ffcbf-hg7kh\" (UID: \"7714d145-189b-45dc-991a-8187eea75689\") " pod="calico-system/calico-typha-bcd4ffcbf-hg7kh" Feb 9 19:28:09.406844 kubelet[2075]: I0209 19:28:09.406826 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fczv9\" (UniqueName: \"kubernetes.io/projected/7714d145-189b-45dc-991a-8187eea75689-kube-api-access-fczv9\") pod \"calico-typha-bcd4ffcbf-hg7kh\" (UID: \"7714d145-189b-45dc-991a-8187eea75689\") " pod="calico-system/calico-typha-bcd4ffcbf-hg7kh" Feb 9 19:28:09.455851 kubelet[2075]: I0209 19:28:09.455723 2075 topology_manager.go:215] "Topology Admit Handler" podUID="f765a641-4dd7-47fb-afd5-3c00e8bc677f" podNamespace="calico-system" podName="calico-node-9tlgc" Feb 9 19:28:09.491553 systemd[1]: Created slice kubepods-besteffort-podf765a641_4dd7_47fb_afd5_3c00e8bc677f.slice. Feb 9 19:28:09.507454 kubelet[2075]: I0209 19:28:09.507418 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f765a641-4dd7-47fb-afd5-3c00e8bc677f-xtables-lock\") pod \"calico-node-9tlgc\" (UID: \"f765a641-4dd7-47fb-afd5-3c00e8bc677f\") " pod="calico-system/calico-node-9tlgc" Feb 9 19:28:09.507783 kubelet[2075]: I0209 19:28:09.507760 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/f765a641-4dd7-47fb-afd5-3c00e8bc677f-cni-bin-dir\") pod \"calico-node-9tlgc\" (UID: \"f765a641-4dd7-47fb-afd5-3c00e8bc677f\") " pod="calico-system/calico-node-9tlgc" Feb 9 19:28:09.507939 kubelet[2075]: I0209 19:28:09.507924 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/f765a641-4dd7-47fb-afd5-3c00e8bc677f-node-certs\") pod \"calico-node-9tlgc\" (UID: \"f765a641-4dd7-47fb-afd5-3c00e8bc677f\") " pod="calico-system/calico-node-9tlgc" Feb 9 19:28:09.508114 kubelet[2075]: I0209 19:28:09.508090 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/f765a641-4dd7-47fb-afd5-3c00e8bc677f-flexvol-driver-host\") pod \"calico-node-9tlgc\" (UID: \"f765a641-4dd7-47fb-afd5-3c00e8bc677f\") " pod="calico-system/calico-node-9tlgc" Feb 9 19:28:09.508320 kubelet[2075]: I0209 19:28:09.508303 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f765a641-4dd7-47fb-afd5-3c00e8bc677f-lib-modules\") pod \"calico-node-9tlgc\" (UID: \"f765a641-4dd7-47fb-afd5-3c00e8bc677f\") " pod="calico-system/calico-node-9tlgc" Feb 9 19:28:09.508893 kubelet[2075]: I0209 19:28:09.508869 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f765a641-4dd7-47fb-afd5-3c00e8bc677f-tigera-ca-bundle\") pod \"calico-node-9tlgc\" (UID: \"f765a641-4dd7-47fb-afd5-3c00e8bc677f\") " pod="calico-system/calico-node-9tlgc" Feb 9 19:28:09.509064 kubelet[2075]: I0209 19:28:09.509050 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/f765a641-4dd7-47fb-afd5-3c00e8bc677f-cni-log-dir\") pod \"calico-node-9tlgc\" (UID: \"f765a641-4dd7-47fb-afd5-3c00e8bc677f\") " pod="calico-system/calico-node-9tlgc" Feb 9 19:28:09.509230 kubelet[2075]: I0209 19:28:09.509216 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bz745\" (UniqueName: \"kubernetes.io/projected/f765a641-4dd7-47fb-afd5-3c00e8bc677f-kube-api-access-bz745\") pod \"calico-node-9tlgc\" (UID: \"f765a641-4dd7-47fb-afd5-3c00e8bc677f\") " pod="calico-system/calico-node-9tlgc" Feb 9 19:28:09.509398 kubelet[2075]: I0209 19:28:09.509384 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/f765a641-4dd7-47fb-afd5-3c00e8bc677f-policysync\") pod \"calico-node-9tlgc\" (UID: \"f765a641-4dd7-47fb-afd5-3c00e8bc677f\") " pod="calico-system/calico-node-9tlgc" Feb 9 19:28:09.509530 kubelet[2075]: I0209 19:28:09.509517 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/f765a641-4dd7-47fb-afd5-3c00e8bc677f-var-run-calico\") pod \"calico-node-9tlgc\" (UID: \"f765a641-4dd7-47fb-afd5-3c00e8bc677f\") " pod="calico-system/calico-node-9tlgc" Feb 9 19:28:09.509658 kubelet[2075]: I0209 19:28:09.509636 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f765a641-4dd7-47fb-afd5-3c00e8bc677f-var-lib-calico\") pod \"calico-node-9tlgc\" (UID: \"f765a641-4dd7-47fb-afd5-3c00e8bc677f\") " pod="calico-system/calico-node-9tlgc" Feb 9 19:28:09.509789 kubelet[2075]: I0209 19:28:09.509775 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/f765a641-4dd7-47fb-afd5-3c00e8bc677f-cni-net-dir\") pod \"calico-node-9tlgc\" (UID: \"f765a641-4dd7-47fb-afd5-3c00e8bc677f\") " pod="calico-system/calico-node-9tlgc" Feb 9 19:28:09.634481 kubelet[2075]: E0209 19:28:09.634451 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.634718 kubelet[2075]: W0209 19:28:09.634693 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.634896 kubelet[2075]: E0209 19:28:09.634878 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.648146 kubelet[2075]: I0209 19:28:09.648084 2075 topology_manager.go:215] "Topology Admit Handler" podUID="f36f0162-fc14-49d3-a469-649f26287da4" podNamespace="calico-system" podName="csi-node-driver-qxx4b" Feb 9 19:28:09.648560 kubelet[2075]: E0209 19:28:09.648527 2075 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qxx4b" podUID="f36f0162-fc14-49d3-a469-649f26287da4" Feb 9 19:28:09.699258 kubelet[2075]: E0209 19:28:09.699219 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.699258 kubelet[2075]: W0209 19:28:09.699250 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.699573 kubelet[2075]: E0209 19:28:09.699285 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.699662 kubelet[2075]: E0209 19:28:09.699598 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.699662 kubelet[2075]: W0209 19:28:09.699611 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.699662 kubelet[2075]: E0209 19:28:09.699634 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.701323 kubelet[2075]: E0209 19:28:09.701296 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.701323 kubelet[2075]: W0209 19:28:09.701320 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.701570 kubelet[2075]: E0209 19:28:09.701349 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.701672 kubelet[2075]: E0209 19:28:09.701649 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.701672 kubelet[2075]: W0209 19:28:09.701669 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.701824 kubelet[2075]: E0209 19:28:09.701690 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.702141 kubelet[2075]: E0209 19:28:09.702118 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.702141 kubelet[2075]: W0209 19:28:09.702138 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.702399 kubelet[2075]: E0209 19:28:09.702160 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.702482 kubelet[2075]: E0209 19:28:09.702459 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.702565 kubelet[2075]: W0209 19:28:09.702482 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.702565 kubelet[2075]: E0209 19:28:09.702501 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.702918 kubelet[2075]: E0209 19:28:09.702896 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.702918 kubelet[2075]: W0209 19:28:09.702916 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.703107 kubelet[2075]: E0209 19:28:09.702936 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.703253 kubelet[2075]: E0209 19:28:09.703230 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.703253 kubelet[2075]: W0209 19:28:09.703249 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.703414 kubelet[2075]: E0209 19:28:09.703268 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.703702 kubelet[2075]: E0209 19:28:09.703681 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.703702 kubelet[2075]: W0209 19:28:09.703700 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.703880 kubelet[2075]: E0209 19:28:09.703720 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.704003 kubelet[2075]: E0209 19:28:09.703981 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.704003 kubelet[2075]: W0209 19:28:09.704001 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.704146 kubelet[2075]: E0209 19:28:09.704024 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.704327 kubelet[2075]: E0209 19:28:09.704307 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.704327 kubelet[2075]: W0209 19:28:09.704325 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.704490 kubelet[2075]: E0209 19:28:09.704344 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.706400 kubelet[2075]: E0209 19:28:09.706303 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.706400 kubelet[2075]: W0209 19:28:09.706324 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.706400 kubelet[2075]: E0209 19:28:09.706345 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.706660 kubelet[2075]: E0209 19:28:09.706640 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.706660 kubelet[2075]: W0209 19:28:09.706659 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.706801 kubelet[2075]: E0209 19:28:09.706679 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.707238 kubelet[2075]: E0209 19:28:09.707077 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.707238 kubelet[2075]: W0209 19:28:09.707093 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.707238 kubelet[2075]: E0209 19:28:09.707112 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.711292 kubelet[2075]: E0209 19:28:09.711266 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.711292 kubelet[2075]: W0209 19:28:09.711287 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.711491 kubelet[2075]: E0209 19:28:09.711316 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.714290 kubelet[2075]: E0209 19:28:09.714265 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.714290 kubelet[2075]: W0209 19:28:09.714287 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.714474 kubelet[2075]: E0209 19:28:09.714311 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.714691 kubelet[2075]: E0209 19:28:09.714668 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.714691 kubelet[2075]: W0209 19:28:09.714689 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.714843 kubelet[2075]: E0209 19:28:09.714710 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.715138 kubelet[2075]: E0209 19:28:09.715117 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.715138 kubelet[2075]: W0209 19:28:09.715136 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.715312 kubelet[2075]: E0209 19:28:09.715157 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.715478 kubelet[2075]: E0209 19:28:09.715456 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.715478 kubelet[2075]: W0209 19:28:09.715475 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.715634 kubelet[2075]: E0209 19:28:09.715495 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.715903 kubelet[2075]: E0209 19:28:09.715882 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.715903 kubelet[2075]: W0209 19:28:09.715901 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.716037 kubelet[2075]: E0209 19:28:09.715920 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.716389 kubelet[2075]: E0209 19:28:09.716364 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.716389 kubelet[2075]: W0209 19:28:09.716385 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.716571 kubelet[2075]: E0209 19:28:09.716412 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.716571 kubelet[2075]: I0209 19:28:09.716456 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f36f0162-fc14-49d3-a469-649f26287da4-varrun\") pod \"csi-node-driver-qxx4b\" (UID: \"f36f0162-fc14-49d3-a469-649f26287da4\") " pod="calico-system/csi-node-driver-qxx4b" Feb 9 19:28:09.716770 kubelet[2075]: E0209 19:28:09.716747 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.716848 kubelet[2075]: W0209 19:28:09.716771 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.716848 kubelet[2075]: E0209 19:28:09.716796 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.717330 kubelet[2075]: E0209 19:28:09.717294 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.717330 kubelet[2075]: W0209 19:28:09.717325 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.717529 kubelet[2075]: E0209 19:28:09.717354 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.717529 kubelet[2075]: I0209 19:28:09.717392 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f36f0162-fc14-49d3-a469-649f26287da4-socket-dir\") pod \"csi-node-driver-qxx4b\" (UID: \"f36f0162-fc14-49d3-a469-649f26287da4\") " pod="calico-system/csi-node-driver-qxx4b" Feb 9 19:28:09.717750 kubelet[2075]: E0209 19:28:09.717725 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.717750 kubelet[2075]: W0209 19:28:09.717747 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.717899 kubelet[2075]: E0209 19:28:09.717773 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.717899 kubelet[2075]: I0209 19:28:09.717807 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-frc97\" (UniqueName: \"kubernetes.io/projected/f36f0162-fc14-49d3-a469-649f26287da4-kube-api-access-frc97\") pod \"csi-node-driver-qxx4b\" (UID: \"f36f0162-fc14-49d3-a469-649f26287da4\") " pod="calico-system/csi-node-driver-qxx4b" Feb 9 19:28:09.718202 kubelet[2075]: E0209 19:28:09.718159 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.718307 kubelet[2075]: W0209 19:28:09.718210 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.718373 kubelet[2075]: E0209 19:28:09.718353 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.718587 kubelet[2075]: E0209 19:28:09.718562 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.718587 kubelet[2075]: W0209 19:28:09.718583 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.718756 kubelet[2075]: E0209 19:28:09.718722 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.718925 kubelet[2075]: E0209 19:28:09.718903 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.718925 kubelet[2075]: W0209 19:28:09.718923 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.719066 kubelet[2075]: E0209 19:28:09.719049 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.719276 kubelet[2075]: E0209 19:28:09.719256 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.719276 kubelet[2075]: W0209 19:28:09.719273 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.719454 kubelet[2075]: E0209 19:28:09.719298 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.719607 kubelet[2075]: E0209 19:28:09.719546 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.719607 kubelet[2075]: W0209 19:28:09.719558 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.719607 kubelet[2075]: E0209 19:28:09.719582 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.719607 kubelet[2075]: I0209 19:28:09.719612 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f36f0162-fc14-49d3-a469-649f26287da4-kubelet-dir\") pod \"csi-node-driver-qxx4b\" (UID: \"f36f0162-fc14-49d3-a469-649f26287da4\") " pod="calico-system/csi-node-driver-qxx4b" Feb 9 19:28:09.719886 kubelet[2075]: E0209 19:28:09.719862 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.719946 kubelet[2075]: W0209 19:28:09.719875 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.719946 kubelet[2075]: E0209 19:28:09.719931 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.720362 kubelet[2075]: E0209 19:28:09.720336 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.720362 kubelet[2075]: W0209 19:28:09.720358 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.720528 kubelet[2075]: E0209 19:28:09.720387 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.720903 kubelet[2075]: E0209 19:28:09.720650 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.720903 kubelet[2075]: W0209 19:28:09.720667 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.720903 kubelet[2075]: E0209 19:28:09.720690 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.721105 kubelet[2075]: E0209 19:28:09.720944 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.721105 kubelet[2075]: W0209 19:28:09.720956 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.721105 kubelet[2075]: E0209 19:28:09.720975 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.721454 kubelet[2075]: E0209 19:28:09.721326 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.721454 kubelet[2075]: W0209 19:28:09.721345 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.721454 kubelet[2075]: E0209 19:28:09.721384 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.721683 kubelet[2075]: E0209 19:28:09.721662 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.721683 kubelet[2075]: W0209 19:28:09.721674 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.721797 kubelet[2075]: E0209 19:28:09.721697 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.722033 kubelet[2075]: E0209 19:28:09.722008 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.722033 kubelet[2075]: W0209 19:28:09.722029 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.722215 kubelet[2075]: E0209 19:28:09.722054 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.722215 kubelet[2075]: I0209 19:28:09.722090 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f36f0162-fc14-49d3-a469-649f26287da4-registration-dir\") pod \"csi-node-driver-qxx4b\" (UID: \"f36f0162-fc14-49d3-a469-649f26287da4\") " pod="calico-system/csi-node-driver-qxx4b" Feb 9 19:28:09.723223 kubelet[2075]: E0209 19:28:09.722408 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.723223 kubelet[2075]: W0209 19:28:09.722424 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.723223 kubelet[2075]: E0209 19:28:09.722444 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.723223 kubelet[2075]: E0209 19:28:09.722789 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.723223 kubelet[2075]: W0209 19:28:09.722802 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.723223 kubelet[2075]: E0209 19:28:09.722825 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.726546 kubelet[2075]: E0209 19:28:09.726518 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.726546 kubelet[2075]: W0209 19:28:09.726543 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.726853 kubelet[2075]: E0209 19:28:09.726801 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.726853 kubelet[2075]: E0209 19:28:09.726819 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.726853 kubelet[2075]: W0209 19:28:09.726831 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.726853 kubelet[2075]: E0209 19:28:09.726851 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.828192 kubelet[2075]: E0209 19:28:09.828135 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.828454 kubelet[2075]: W0209 19:28:09.828427 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.828616 kubelet[2075]: E0209 19:28:09.828596 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.829168 kubelet[2075]: E0209 19:28:09.829150 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.829371 kubelet[2075]: W0209 19:28:09.829352 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.829494 kubelet[2075]: E0209 19:28:09.829480 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.829950 kubelet[2075]: E0209 19:28:09.829935 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.830095 kubelet[2075]: W0209 19:28:09.830080 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.830253 kubelet[2075]: E0209 19:28:09.830235 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.830690 kubelet[2075]: E0209 19:28:09.830672 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.830835 kubelet[2075]: W0209 19:28:09.830815 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.830971 kubelet[2075]: E0209 19:28:09.830948 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.831392 kubelet[2075]: E0209 19:28:09.831376 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.831524 kubelet[2075]: W0209 19:28:09.831508 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.831650 kubelet[2075]: E0209 19:28:09.831637 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.832087 kubelet[2075]: E0209 19:28:09.832071 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.832230 kubelet[2075]: W0209 19:28:09.832212 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.832363 kubelet[2075]: E0209 19:28:09.832347 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.832825 kubelet[2075]: E0209 19:28:09.832808 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.832971 kubelet[2075]: W0209 19:28:09.832943 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.833093 kubelet[2075]: E0209 19:28:09.833079 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.833528 kubelet[2075]: E0209 19:28:09.833510 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.833655 kubelet[2075]: W0209 19:28:09.833637 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.833782 kubelet[2075]: E0209 19:28:09.833766 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.834225 kubelet[2075]: E0209 19:28:09.834207 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.834351 kubelet[2075]: W0209 19:28:09.834333 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.834476 kubelet[2075]: E0209 19:28:09.834463 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.835382 kubelet[2075]: E0209 19:28:09.835364 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.835554 kubelet[2075]: W0209 19:28:09.835534 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.835683 kubelet[2075]: E0209 19:28:09.835667 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.838288 kubelet[2075]: E0209 19:28:09.838267 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.838467 kubelet[2075]: W0209 19:28:09.838447 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.838601 kubelet[2075]: E0209 19:28:09.838585 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.839303 kubelet[2075]: E0209 19:28:09.839279 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.839303 kubelet[2075]: W0209 19:28:09.839301 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.839479 kubelet[2075]: E0209 19:28:09.839328 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.839764 kubelet[2075]: E0209 19:28:09.839614 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.839764 kubelet[2075]: W0209 19:28:09.839628 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.839764 kubelet[2075]: E0209 19:28:09.839651 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.840249 kubelet[2075]: E0209 19:28:09.840227 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.840249 kubelet[2075]: W0209 19:28:09.840247 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.840408 kubelet[2075]: E0209 19:28:09.840383 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.840648 kubelet[2075]: E0209 19:28:09.840623 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.840648 kubelet[2075]: W0209 19:28:09.840646 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.840796 kubelet[2075]: E0209 19:28:09.840766 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.841000 kubelet[2075]: E0209 19:28:09.840977 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.841000 kubelet[2075]: W0209 19:28:09.840998 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.841498 kubelet[2075]: E0209 19:28:09.841151 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.841498 kubelet[2075]: E0209 19:28:09.841363 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.841498 kubelet[2075]: W0209 19:28:09.841376 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.841498 kubelet[2075]: E0209 19:28:09.841399 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.841767 kubelet[2075]: E0209 19:28:09.841699 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.841767 kubelet[2075]: W0209 19:28:09.841711 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.841767 kubelet[2075]: E0209 19:28:09.841736 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.842094 kubelet[2075]: E0209 19:28:09.842070 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.842094 kubelet[2075]: W0209 19:28:09.842092 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.842271 kubelet[2075]: E0209 19:28:09.842117 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.842484 kubelet[2075]: E0209 19:28:09.842450 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.842484 kubelet[2075]: W0209 19:28:09.842481 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.842633 kubelet[2075]: E0209 19:28:09.842600 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.842828 kubelet[2075]: E0209 19:28:09.842807 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.842828 kubelet[2075]: W0209 19:28:09.842827 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.842977 kubelet[2075]: E0209 19:28:09.842947 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.843163 kubelet[2075]: E0209 19:28:09.843126 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.843163 kubelet[2075]: W0209 19:28:09.843147 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.843335 kubelet[2075]: E0209 19:28:09.843187 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.843607 kubelet[2075]: E0209 19:28:09.843572 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.843607 kubelet[2075]: W0209 19:28:09.843591 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.843775 kubelet[2075]: E0209 19:28:09.843616 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.844242 kubelet[2075]: E0209 19:28:09.844156 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.844380 kubelet[2075]: W0209 19:28:09.844361 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.844733 kubelet[2075]: E0209 19:28:09.844705 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.845095 kubelet[2075]: E0209 19:28:09.845078 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.845229 kubelet[2075]: W0209 19:28:09.845211 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.845442 kubelet[2075]: E0209 19:28:09.845424 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.845613 kubelet[2075]: E0209 19:28:09.845603 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.845693 kubelet[2075]: W0209 19:28:09.845681 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.845813 kubelet[2075]: E0209 19:28:09.845794 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.846288 kubelet[2075]: E0209 19:28:09.846266 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.846288 kubelet[2075]: W0209 19:28:09.846286 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.846466 kubelet[2075]: E0209 19:28:09.846316 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.846636 kubelet[2075]: E0209 19:28:09.846615 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.846636 kubelet[2075]: W0209 19:28:09.846634 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.846791 kubelet[2075]: E0209 19:28:09.846660 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.846998 kubelet[2075]: E0209 19:28:09.846977 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.846998 kubelet[2075]: W0209 19:28:09.846996 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.847153 kubelet[2075]: E0209 19:28:09.847142 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.847657 kubelet[2075]: E0209 19:28:09.847633 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.847657 kubelet[2075]: W0209 19:28:09.847654 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.847811 kubelet[2075]: E0209 19:28:09.847678 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.943541 kubelet[2075]: E0209 19:28:09.943503 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.943541 kubelet[2075]: W0209 19:28:09.943534 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.943819 kubelet[2075]: E0209 19:28:09.943563 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.944163 kubelet[2075]: E0209 19:28:09.944137 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.944163 kubelet[2075]: W0209 19:28:09.944158 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.944360 kubelet[2075]: E0209 19:28:09.944205 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.944634 kubelet[2075]: E0209 19:28:09.944595 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.944634 kubelet[2075]: W0209 19:28:09.944630 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.944786 kubelet[2075]: E0209 19:28:09.944654 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.944988 kubelet[2075]: E0209 19:28:09.944948 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.944988 kubelet[2075]: W0209 19:28:09.944969 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.944988 kubelet[2075]: E0209 19:28:09.944990 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.945328 kubelet[2075]: E0209 19:28:09.945305 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.945328 kubelet[2075]: W0209 19:28:09.945326 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.945468 kubelet[2075]: E0209 19:28:09.945347 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:09.945667 kubelet[2075]: E0209 19:28:09.945637 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:09.945667 kubelet[2075]: W0209 19:28:09.945664 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:09.945812 kubelet[2075]: E0209 19:28:09.945685 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.046760 kubelet[2075]: E0209 19:28:10.046648 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.047021 kubelet[2075]: W0209 19:28:10.046992 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.047211 kubelet[2075]: E0209 19:28:10.047192 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.055212 kubelet[2075]: E0209 19:28:10.055154 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.055421 kubelet[2075]: W0209 19:28:10.055402 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.055546 kubelet[2075]: E0209 19:28:10.055532 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.058572 kubelet[2075]: E0209 19:28:10.058548 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.058735 kubelet[2075]: W0209 19:28:10.058715 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.058870 kubelet[2075]: E0209 19:28:10.058856 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.061111 kubelet[2075]: E0209 19:28:10.061089 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.061304 kubelet[2075]: W0209 19:28:10.061264 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.061449 kubelet[2075]: E0209 19:28:10.061432 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.062439 kubelet[2075]: E0209 19:28:10.062420 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.062604 kubelet[2075]: W0209 19:28:10.062581 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.062746 kubelet[2075]: E0209 19:28:10.062733 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.063423 kubelet[2075]: E0209 19:28:10.063405 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.063616 kubelet[2075]: W0209 19:28:10.063561 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.063747 kubelet[2075]: E0209 19:28:10.063732 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.165362 kubelet[2075]: E0209 19:28:10.165311 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.165362 kubelet[2075]: W0209 19:28:10.165339 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.165362 kubelet[2075]: E0209 19:28:10.165369 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.165759 kubelet[2075]: E0209 19:28:10.165736 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.165759 kubelet[2075]: W0209 19:28:10.165759 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.165900 kubelet[2075]: E0209 19:28:10.165781 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.166091 kubelet[2075]: E0209 19:28:10.166067 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.166091 kubelet[2075]: W0209 19:28:10.166088 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.166306 kubelet[2075]: E0209 19:28:10.166109 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.166452 kubelet[2075]: E0209 19:28:10.166429 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.166524 kubelet[2075]: W0209 19:28:10.166451 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.166524 kubelet[2075]: E0209 19:28:10.166471 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.166789 kubelet[2075]: E0209 19:28:10.166768 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.166789 kubelet[2075]: W0209 19:28:10.166788 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.166929 kubelet[2075]: E0209 19:28:10.166808 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.167102 kubelet[2075]: E0209 19:28:10.167080 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.167102 kubelet[2075]: W0209 19:28:10.167101 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.167257 kubelet[2075]: E0209 19:28:10.167127 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.215224 kernel: kauditd_printk_skb: 369 callbacks suppressed Feb 9 19:28:10.215441 kernel: audit: type=1325 audit(1707506890.211:1108): table=filter:93 family=2 entries=16 op=nft_register_rule pid=2545 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:10.211000 audit[2545]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2545 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:10.211000 audit[2545]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd4a248480 a2=0 a3=7ffd4a24846c items=0 ppid=2259 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:10.278954 kernel: audit: type=1300 audit(1707506890.211:1108): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd4a248480 a2=0 a3=7ffd4a24846c items=0 ppid=2259 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:10.279132 kernel: audit: type=1327 audit(1707506890.211:1108): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:10.211000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:10.292923 kubelet[2075]: E0209 19:28:10.292870 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.293220 kubelet[2075]: W0209 19:28:10.293163 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.293387 kubelet[2075]: E0209 19:28:10.293358 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.293940 kubelet[2075]: E0209 19:28:10.293923 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.294096 kubelet[2075]: W0209 19:28:10.294078 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.294238 kubelet[2075]: E0209 19:28:10.294223 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.295057 kubelet[2075]: E0209 19:28:10.295029 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.295220 kubelet[2075]: W0209 19:28:10.295201 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.295349 kubelet[2075]: E0209 19:28:10.295335 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.295733 kubelet[2075]: E0209 19:28:10.295718 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.295858 kubelet[2075]: W0209 19:28:10.295840 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.295962 kubelet[2075]: E0209 19:28:10.295948 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.296343 kubelet[2075]: E0209 19:28:10.296327 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.296482 kubelet[2075]: W0209 19:28:10.296465 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.296609 kubelet[2075]: E0209 19:28:10.296592 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.301817 kubelet[2075]: E0209 19:28:10.301793 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.301981 kubelet[2075]: W0209 19:28:10.301960 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.302135 kubelet[2075]: E0209 19:28:10.302117 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.298000 audit[2545]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2545 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:10.311855 kubelet[2075]: E0209 19:28:10.308577 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.311855 kubelet[2075]: W0209 19:28:10.308593 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.311855 kubelet[2075]: E0209 19:28:10.308615 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.311855 kubelet[2075]: E0209 19:28:10.309797 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.311855 kubelet[2075]: W0209 19:28:10.309820 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.311855 kubelet[2075]: E0209 19:28:10.309844 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.298000 audit[2545]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd4a248480 a2=0 a3=31030 items=0 ppid=2259 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:10.352864 kernel: audit: type=1325 audit(1707506890.298:1109): table=nat:94 family=2 entries=12 op=nft_register_rule pid=2545 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:10.353044 kernel: audit: type=1300 audit(1707506890.298:1109): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd4a248480 a2=0 a3=31030 items=0 ppid=2259 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:10.298000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:10.368584 kernel: audit: type=1327 audit(1707506890.298:1109): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:10.394361 kubelet[2075]: E0209 19:28:10.394328 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.394919 kubelet[2075]: W0209 19:28:10.394892 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.395049 kubelet[2075]: E0209 19:28:10.395032 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.396007 kubelet[2075]: E0209 19:28:10.395977 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.396162 kubelet[2075]: W0209 19:28:10.396142 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.396326 kubelet[2075]: E0209 19:28:10.396310 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.402948 kubelet[2075]: E0209 19:28:10.402912 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.403148 kubelet[2075]: W0209 19:28:10.403127 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.403416 kubelet[2075]: E0209 19:28:10.403399 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.403530 env[1144]: time="2024-02-09T19:28:10.403488928Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9tlgc,Uid:f765a641-4dd7-47fb-afd5-3c00e8bc677f,Namespace:calico-system,Attempt:0,}" Feb 9 19:28:10.404490 kubelet[2075]: E0209 19:28:10.404469 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.404668 kubelet[2075]: W0209 19:28:10.404647 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.406513 kubelet[2075]: E0209 19:28:10.406490 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.415275 kubelet[2075]: E0209 19:28:10.415250 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.419717 kubelet[2075]: W0209 19:28:10.419691 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.419912 kubelet[2075]: E0209 19:28:10.419897 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.436527 env[1144]: time="2024-02-09T19:28:10.436446399Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:28:10.436803 env[1144]: time="2024-02-09T19:28:10.436757428Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:28:10.436945 env[1144]: time="2024-02-09T19:28:10.436910464Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:28:10.437349 env[1144]: time="2024-02-09T19:28:10.437306079Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/932de156454b190c9a360b46603db2ed4c2ad240293bdeec0b21261c670f8aa4 pid=2568 runtime=io.containerd.runc.v2 Feb 9 19:28:10.476687 systemd[1]: Started cri-containerd-932de156454b190c9a360b46603db2ed4c2ad240293bdeec0b21261c670f8aa4.scope. Feb 9 19:28:10.523207 kernel: audit: type=1400 audit(1707506890.500:1110): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.523520 kubelet[2075]: E0209 19:28:10.507833 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.523520 kubelet[2075]: W0209 19:28:10.507865 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.523520 kubelet[2075]: E0209 19:28:10.507896 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.523520 kubelet[2075]: E0209 19:28:10.510734 2075 secret.go:194] Couldn't get secret calico-system/typha-certs: failed to sync secret cache: timed out waiting for the condition Feb 9 19:28:10.523520 kubelet[2075]: E0209 19:28:10.510848 2075 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/7714d145-189b-45dc-991a-8187eea75689-typha-certs podName:7714d145-189b-45dc-991a-8187eea75689 nodeName:}" failed. No retries permitted until 2024-02-09 19:28:11.010819953 +0000 UTC m=+21.258906757 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "typha-certs" (UniqueName: "kubernetes.io/secret/7714d145-189b-45dc-991a-8187eea75689-typha-certs") pod "calico-typha-bcd4ffcbf-hg7kh" (UID: "7714d145-189b-45dc-991a-8187eea75689") : failed to sync secret cache: timed out waiting for the condition Feb 9 19:28:10.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.566497 kernel: audit: type=1400 audit(1707506890.500:1111): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.566691 kernel: audit: type=1400 audit(1707506890.500:1112): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.590398 kernel: audit: type=1400 audit(1707506890.500:1113): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.501000 audit: BPF prog-id=130 op=LOAD Feb 9 19:28:10.523000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.523000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2568 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:10.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326465313536343534623139306339613336306234363630336462 Feb 9 19:28:10.523000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.523000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2568 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:10.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326465313536343534623139306339613336306234363630336462 Feb 9 19:28:10.523000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.523000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.523000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.523000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.523000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.523000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.523000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.523000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.523000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.523000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.523000 audit: BPF prog-id=131 op=LOAD Feb 9 19:28:10.523000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185ba0 items=0 ppid=2568 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:10.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326465313536343534623139306339613336306234363630336462 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit: BPF prog-id=132 op=LOAD Feb 9 19:28:10.565000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000322cd8 items=0 ppid=2568 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:10.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326465313536343534623139306339613336306234363630336462 Feb 9 19:28:10.565000 audit: BPF prog-id=132 op=UNLOAD Feb 9 19:28:10.565000 audit: BPF prog-id=131 op=UNLOAD Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:10.565000 audit: BPF prog-id=133 op=LOAD Feb 9 19:28:10.565000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003230e8 items=0 ppid=2568 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:10.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326465313536343534623139306339613336306234363630336462 Feb 9 19:28:10.608835 kubelet[2075]: E0209 19:28:10.608796 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.608835 kubelet[2075]: W0209 19:28:10.608827 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.609130 kubelet[2075]: E0209 19:28:10.608857 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.625837 env[1144]: time="2024-02-09T19:28:10.625756513Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9tlgc,Uid:f765a641-4dd7-47fb-afd5-3c00e8bc677f,Namespace:calico-system,Attempt:0,} returns sandbox id \"932de156454b190c9a360b46603db2ed4c2ad240293bdeec0b21261c670f8aa4\"" Feb 9 19:28:10.627796 env[1144]: time="2024-02-09T19:28:10.627749721Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:28:10.709836 kubelet[2075]: E0209 19:28:10.709692 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.709836 kubelet[2075]: W0209 19:28:10.709723 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.709836 kubelet[2075]: E0209 19:28:10.709757 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.811590 kubelet[2075]: E0209 19:28:10.811455 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.811590 kubelet[2075]: W0209 19:28:10.811483 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.811590 kubelet[2075]: E0209 19:28:10.811514 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:10.913059 kubelet[2075]: E0209 19:28:10.912812 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:10.913059 kubelet[2075]: W0209 19:28:10.912851 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:10.913059 kubelet[2075]: E0209 19:28:10.912885 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:11.014560 kubelet[2075]: E0209 19:28:11.014267 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:11.014560 kubelet[2075]: W0209 19:28:11.014295 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:11.014560 kubelet[2075]: E0209 19:28:11.014328 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:11.014965 kubelet[2075]: E0209 19:28:11.014918 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:11.014965 kubelet[2075]: W0209 19:28:11.014938 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:11.014965 kubelet[2075]: E0209 19:28:11.014961 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:11.015723 kubelet[2075]: E0209 19:28:11.015696 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:11.015723 kubelet[2075]: W0209 19:28:11.015719 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:11.015960 kubelet[2075]: E0209 19:28:11.015745 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:11.016063 kubelet[2075]: E0209 19:28:11.016041 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:11.016143 kubelet[2075]: W0209 19:28:11.016063 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:11.016143 kubelet[2075]: E0209 19:28:11.016091 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:11.016441 kubelet[2075]: E0209 19:28:11.016417 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:11.016441 kubelet[2075]: W0209 19:28:11.016438 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:11.016599 kubelet[2075]: E0209 19:28:11.016458 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:11.021543 kubelet[2075]: E0209 19:28:11.021515 2075 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qxx4b" podUID="f36f0162-fc14-49d3-a469-649f26287da4" Feb 9 19:28:11.030619 kubelet[2075]: E0209 19:28:11.030587 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:28:11.030856 kubelet[2075]: W0209 19:28:11.030829 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:28:11.031016 kubelet[2075]: E0209 19:28:11.030996 2075 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:28:11.142247 env[1144]: time="2024-02-09T19:28:11.142160992Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-bcd4ffcbf-hg7kh,Uid:7714d145-189b-45dc-991a-8187eea75689,Namespace:calico-system,Attempt:0,}" Feb 9 19:28:11.176489 env[1144]: time="2024-02-09T19:28:11.175454838Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:28:11.178611 env[1144]: time="2024-02-09T19:28:11.178147075Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:28:11.179123 env[1144]: time="2024-02-09T19:28:11.179048960Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:28:11.179672 env[1144]: time="2024-02-09T19:28:11.179618851Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/482e549496ab03e00bd02b104ab20ab2876d2c218cae41337e442d543ee0160b pid=2619 runtime=io.containerd.runc.v2 Feb 9 19:28:11.216463 systemd[1]: Started cri-containerd-482e549496ab03e00bd02b104ab20ab2876d2c218cae41337e442d543ee0160b.scope. Feb 9 19:28:11.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.250000 audit: BPF prog-id=134 op=LOAD Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2619 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:11.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438326535343934393661623033653030626430326231303461623230 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2619 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:11.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438326535343934393661623033653030626430326231303461623230 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit: BPF prog-id=135 op=LOAD Feb 9 19:28:11.251000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003cae40 items=0 ppid=2619 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:11.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438326535343934393661623033653030626430326231303461623230 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.251000 audit: BPF prog-id=136 op=LOAD Feb 9 19:28:11.251000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003cae88 items=0 ppid=2619 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:11.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438326535343934393661623033653030626430326231303461623230 Feb 9 19:28:11.251000 audit: BPF prog-id=136 op=UNLOAD Feb 9 19:28:11.255000 audit: BPF prog-id=135 op=UNLOAD Feb 9 19:28:11.255000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.255000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.255000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.255000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.255000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.255000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.255000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.255000 audit[2630]: AVC avc: denied { perfmon } for pid=2630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.255000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.255000 audit[2630]: AVC avc: denied { bpf } for pid=2630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:11.255000 audit: BPF prog-id=137 op=LOAD Feb 9 19:28:11.255000 audit[2630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003cb298 items=0 ppid=2619 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:11.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438326535343934393661623033653030626430326231303461623230 Feb 9 19:28:11.312309 env[1144]: time="2024-02-09T19:28:11.312255735Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-bcd4ffcbf-hg7kh,Uid:7714d145-189b-45dc-991a-8187eea75689,Namespace:calico-system,Attempt:0,} returns sandbox id \"482e549496ab03e00bd02b104ab20ab2876d2c218cae41337e442d543ee0160b\"" Feb 9 19:28:11.623964 systemd[1]: run-containerd-runc-k8s.io-482e549496ab03e00bd02b104ab20ab2876d2c218cae41337e442d543ee0160b-runc.ErbEJV.mount: Deactivated successfully. Feb 9 19:28:12.311330 env[1144]: time="2024-02-09T19:28:12.311271031Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:12.319112 env[1144]: time="2024-02-09T19:28:12.316653286Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:12.321952 env[1144]: time="2024-02-09T19:28:12.321906587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:12.325794 env[1144]: time="2024-02-09T19:28:12.325751629Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:12.327465 env[1144]: time="2024-02-09T19:28:12.327420617Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 19:28:12.330656 env[1144]: time="2024-02-09T19:28:12.330611057Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 19:28:12.332436 env[1144]: time="2024-02-09T19:28:12.332390643Z" level=info msg="CreateContainer within sandbox \"932de156454b190c9a360b46603db2ed4c2ad240293bdeec0b21261c670f8aa4\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:28:12.356839 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1214014165.mount: Deactivated successfully. Feb 9 19:28:12.363423 env[1144]: time="2024-02-09T19:28:12.363346130Z" level=info msg="CreateContainer within sandbox \"932de156454b190c9a360b46603db2ed4c2ad240293bdeec0b21261c670f8aa4\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"639eba60c7ed4add86a8075fcc885c5aa24ac734e643ff78d3a97b5e21ee5c7f\"" Feb 9 19:28:12.364533 env[1144]: time="2024-02-09T19:28:12.364488047Z" level=info msg="StartContainer for \"639eba60c7ed4add86a8075fcc885c5aa24ac734e643ff78d3a97b5e21ee5c7f\"" Feb 9 19:28:12.410430 systemd[1]: Started cri-containerd-639eba60c7ed4add86a8075fcc885c5aa24ac734e643ff78d3a97b5e21ee5c7f.scope. Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2568 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:12.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633396562613630633765643461646438366138303735666363383835 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit: BPF prog-id=138 op=LOAD Feb 9 19:28:12.463000 audit[2658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000277c70 items=0 ppid=2568 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:12.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633396562613630633765643461646438366138303735666363383835 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit: BPF prog-id=139 op=LOAD Feb 9 19:28:12.463000 audit[2658]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000277cb8 items=0 ppid=2568 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:12.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633396562613630633765643461646438366138303735666363383835 Feb 9 19:28:12.463000 audit: BPF prog-id=139 op=UNLOAD Feb 9 19:28:12.463000 audit: BPF prog-id=138 op=UNLOAD Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:12.463000 audit: BPF prog-id=140 op=LOAD Feb 9 19:28:12.463000 audit[2658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000277d48 items=0 ppid=2568 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:12.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633396562613630633765643461646438366138303735666363383835 Feb 9 19:28:12.491550 env[1144]: time="2024-02-09T19:28:12.491490819Z" level=info msg="StartContainer for \"639eba60c7ed4add86a8075fcc885c5aa24ac734e643ff78d3a97b5e21ee5c7f\" returns successfully" Feb 9 19:28:12.518037 systemd[1]: cri-containerd-639eba60c7ed4add86a8075fcc885c5aa24ac734e643ff78d3a97b5e21ee5c7f.scope: Deactivated successfully. Feb 9 19:28:12.518000 audit: BPF prog-id=140 op=UNLOAD Feb 9 19:28:12.623705 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-639eba60c7ed4add86a8075fcc885c5aa24ac734e643ff78d3a97b5e21ee5c7f-rootfs.mount: Deactivated successfully. Feb 9 19:28:12.877978 env[1144]: time="2024-02-09T19:28:12.877806073Z" level=info msg="shim disconnected" id=639eba60c7ed4add86a8075fcc885c5aa24ac734e643ff78d3a97b5e21ee5c7f Feb 9 19:28:12.877978 env[1144]: time="2024-02-09T19:28:12.877887086Z" level=warning msg="cleaning up after shim disconnected" id=639eba60c7ed4add86a8075fcc885c5aa24ac734e643ff78d3a97b5e21ee5c7f namespace=k8s.io Feb 9 19:28:12.877978 env[1144]: time="2024-02-09T19:28:12.877902112Z" level=info msg="cleaning up dead shim" Feb 9 19:28:12.891278 env[1144]: time="2024-02-09T19:28:12.891212681Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:28:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2698 runtime=io.containerd.runc.v2\n" Feb 9 19:28:13.020035 kubelet[2075]: E0209 19:28:13.019967 2075 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qxx4b" podUID="f36f0162-fc14-49d3-a469-649f26287da4" Feb 9 19:28:13.310329 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3798154207.mount: Deactivated successfully. Feb 9 19:28:14.839497 env[1144]: time="2024-02-09T19:28:14.839431781Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:14.842527 env[1144]: time="2024-02-09T19:28:14.842474055Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:14.845454 env[1144]: time="2024-02-09T19:28:14.845413076Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:14.851895 env[1144]: time="2024-02-09T19:28:14.851835908Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:14.857279 env[1144]: time="2024-02-09T19:28:14.857234998Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 9 19:28:14.859431 env[1144]: time="2024-02-09T19:28:14.859390098Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:28:14.882248 env[1144]: time="2024-02-09T19:28:14.882048393Z" level=info msg="CreateContainer within sandbox \"482e549496ab03e00bd02b104ab20ab2876d2c218cae41337e442d543ee0160b\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 19:28:14.902533 env[1144]: time="2024-02-09T19:28:14.902458587Z" level=info msg="CreateContainer within sandbox \"482e549496ab03e00bd02b104ab20ab2876d2c218cae41337e442d543ee0160b\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"6bd5273ac0c191ea998cf866ef227e445312e086a31e62e6662278218afefdb5\"" Feb 9 19:28:14.905348 env[1144]: time="2024-02-09T19:28:14.903344033Z" level=info msg="StartContainer for \"6bd5273ac0c191ea998cf866ef227e445312e086a31e62e6662278218afefdb5\"" Feb 9 19:28:14.935095 systemd[1]: Started cri-containerd-6bd5273ac0c191ea998cf866ef227e445312e086a31e62e6662278218afefdb5.scope. Feb 9 19:28:14.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.958000 audit: BPF prog-id=141 op=LOAD Feb 9 19:28:14.959000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.959000 audit[2725]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2619 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:14.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662643532373361633063313931656139393863663836366566323237 Feb 9 19:28:14.959000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.959000 audit[2725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2619 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:14.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662643532373361633063313931656139393863663836366566323237 Feb 9 19:28:14.960000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.960000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.960000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.960000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.960000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.960000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.960000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.960000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.960000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.960000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.960000 audit: BPF prog-id=142 op=LOAD Feb 9 19:28:14.960000 audit[2725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dab50 items=0 ppid=2619 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:14.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662643532373361633063313931656139393863663836366566323237 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit: BPF prog-id=143 op=LOAD Feb 9 19:28:14.961000 audit[2725]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dab98 items=0 ppid=2619 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:14.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662643532373361633063313931656139393863663836366566323237 Feb 9 19:28:14.961000 audit: BPF prog-id=143 op=UNLOAD Feb 9 19:28:14.961000 audit: BPF prog-id=142 op=UNLOAD Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:14.961000 audit: BPF prog-id=144 op=LOAD Feb 9 19:28:14.961000 audit[2725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001dafa8 items=0 ppid=2619 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:14.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662643532373361633063313931656139393863663836366566323237 Feb 9 19:28:15.015515 env[1144]: time="2024-02-09T19:28:15.015456599Z" level=info msg="StartContainer for \"6bd5273ac0c191ea998cf866ef227e445312e086a31e62e6662278218afefdb5\" returns successfully" Feb 9 19:28:15.019702 kubelet[2075]: E0209 19:28:15.019657 2075 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qxx4b" podUID="f36f0162-fc14-49d3-a469-649f26287da4" Feb 9 19:28:16.205209 kubelet[2075]: I0209 19:28:16.204718 2075 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:28:17.019590 kubelet[2075]: E0209 19:28:17.019543 2075 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qxx4b" podUID="f36f0162-fc14-49d3-a469-649f26287da4" Feb 9 19:28:19.020427 kubelet[2075]: E0209 19:28:19.019847 2075 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qxx4b" podUID="f36f0162-fc14-49d3-a469-649f26287da4" Feb 9 19:28:19.743059 env[1144]: time="2024-02-09T19:28:19.742987010Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:19.746806 env[1144]: time="2024-02-09T19:28:19.746740305Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:19.749957 env[1144]: time="2024-02-09T19:28:19.749895487Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:19.753079 env[1144]: time="2024-02-09T19:28:19.753040130Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:19.754572 env[1144]: time="2024-02-09T19:28:19.754520239Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 19:28:19.759516 env[1144]: time="2024-02-09T19:28:19.759471567Z" level=info msg="CreateContainer within sandbox \"932de156454b190c9a360b46603db2ed4c2ad240293bdeec0b21261c670f8aa4\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:28:19.779828 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount166014733.mount: Deactivated successfully. Feb 9 19:28:19.786441 env[1144]: time="2024-02-09T19:28:19.786379678Z" level=info msg="CreateContainer within sandbox \"932de156454b190c9a360b46603db2ed4c2ad240293bdeec0b21261c670f8aa4\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"898a1e0838cfbc7543ae4a6661de38a79eeea7c6ce63f94867eb12c66fc0bcb7\"" Feb 9 19:28:19.789437 env[1144]: time="2024-02-09T19:28:19.787320822Z" level=info msg="StartContainer for \"898a1e0838cfbc7543ae4a6661de38a79eeea7c6ce63f94867eb12c66fc0bcb7\"" Feb 9 19:28:19.833783 systemd[1]: run-containerd-runc-k8s.io-898a1e0838cfbc7543ae4a6661de38a79eeea7c6ce63f94867eb12c66fc0bcb7-runc.y4zNg4.mount: Deactivated successfully. Feb 9 19:28:19.840337 systemd[1]: Started cri-containerd-898a1e0838cfbc7543ae4a6661de38a79eeea7c6ce63f94867eb12c66fc0bcb7.scope. Feb 9 19:28:19.901299 kernel: kauditd_printk_skb: 211 callbacks suppressed Feb 9 19:28:19.901504 kernel: audit: type=1400 audit(1707506899.873:1171): avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.873000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.873000 audit[2763]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2568 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:19.935341 kernel: audit: type=1300 audit(1707506899.873:1171): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2568 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:19.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839386131653038333863666263373534336165346136363631646533 Feb 9 19:28:19.965292 kernel: audit: type=1327 audit(1707506899.873:1171): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839386131653038333863666263373534336165346136363631646533 Feb 9 19:28:19.873000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.873000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:20.007873 kernel: audit: type=1400 audit(1707506899.873:1172): avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:20.008013 kernel: audit: type=1400 audit(1707506899.873:1172): avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:20.008845 env[1144]: time="2024-02-09T19:28:20.008797078Z" level=info msg="StartContainer for \"898a1e0838cfbc7543ae4a6661de38a79eeea7c6ce63f94867eb12c66fc0bcb7\" returns successfully" Feb 9 19:28:19.873000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:20.030200 kernel: audit: type=1400 audit(1707506899.873:1172): avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:20.030358 kernel: audit: type=1400 audit(1707506899.873:1172): avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.873000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.873000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.873000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:20.094320 kernel: audit: type=1400 audit(1707506899.873:1172): avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:20.094468 kernel: audit: type=1400 audit(1707506899.873:1172): avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.873000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:20.115962 kernel: audit: type=1400 audit(1707506899.873:1172): avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.873000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.873000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.873000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.873000 audit: BPF prog-id=145 op=LOAD Feb 9 19:28:19.873000 audit[2763]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000331c10 items=0 ppid=2568 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:19.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839386131653038333863666263373534336165346136363631646533 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit: BPF prog-id=146 op=LOAD Feb 9 19:28:19.900000 audit[2763]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000331c58 items=0 ppid=2568 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:19.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839386131653038333863666263373534336165346136363631646533 Feb 9 19:28:19.900000 audit: BPF prog-id=146 op=UNLOAD Feb 9 19:28:19.900000 audit: BPF prog-id=145 op=UNLOAD Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:19.900000 audit: BPF prog-id=147 op=LOAD Feb 9 19:28:19.900000 audit[2763]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000331ce8 items=0 ppid=2568 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:19.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839386131653038333863666263373534336165346136363631646533 Feb 9 19:28:20.241208 kubelet[2075]: I0209 19:28:20.239068 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-bcd4ffcbf-hg7kh" podStartSLOduration=7.6955442 podCreationTimestamp="2024-02-09 19:28:09 +0000 UTC" firstStartedPulling="2024-02-09 19:28:11.314362278 +0000 UTC m=+21.562449059" lastFinishedPulling="2024-02-09 19:28:14.857810277 +0000 UTC m=+25.105897077" observedRunningTime="2024-02-09 19:28:15.233904463 +0000 UTC m=+25.481991270" watchObservedRunningTime="2024-02-09 19:28:20.238992218 +0000 UTC m=+30.487079028" Feb 9 19:28:20.378691 kubelet[2075]: I0209 19:28:20.378647 2075 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:28:20.419000 audit[2791]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:20.419000 audit[2791]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fffd9ece510 a2=0 a3=7fffd9ece4fc items=0 ppid=2259 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:20.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:20.421000 audit[2791]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:20.421000 audit[2791]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7fffd9ece510 a2=0 a3=7fffd9ece4fc items=0 ppid=2259 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:20.421000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:20.871632 env[1144]: time="2024-02-09T19:28:20.871453458Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:28:20.875034 systemd[1]: cri-containerd-898a1e0838cfbc7543ae4a6661de38a79eeea7c6ce63f94867eb12c66fc0bcb7.scope: Deactivated successfully. Feb 9 19:28:20.877000 audit: BPF prog-id=147 op=UNLOAD Feb 9 19:28:20.883284 kubelet[2075]: I0209 19:28:20.883227 2075 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:28:20.916077 kubelet[2075]: I0209 19:28:20.916022 2075 topology_manager.go:215] "Topology Admit Handler" podUID="95aa7307-05b7-4ac7-88c4-c4683637bf1d" podNamespace="kube-system" podName="coredns-5dd5756b68-bm2j6" Feb 9 19:28:20.922735 kubelet[2075]: W0209 19:28:20.922394 2075 reflector.go:535] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal' and this object Feb 9 19:28:20.922735 kubelet[2075]: E0209 19:28:20.922436 2075 reflector.go:147] object-"kube-system"/"coredns": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal' and this object Feb 9 19:28:20.924333 kubelet[2075]: I0209 19:28:20.923792 2075 topology_manager.go:215] "Topology Admit Handler" podUID="c9c6a162-5805-4458-8fcc-6dcfaac58dfc" podNamespace="kube-system" podName="coredns-5dd5756b68-2v4px" Feb 9 19:28:20.925325 systemd[1]: Created slice kubepods-burstable-pod95aa7307_05b7_4ac7_88c4_c4683637bf1d.slice. Feb 9 19:28:20.930391 kubelet[2075]: I0209 19:28:20.930081 2075 topology_manager.go:215] "Topology Admit Handler" podUID="49da16b9-492a-4550-8608-77a4393c3ae3" podNamespace="calico-system" podName="calico-kube-controllers-78f6994685-27ng5" Feb 9 19:28:20.942125 systemd[1]: Created slice kubepods-burstable-podc9c6a162_5805_4458_8fcc_6dcfaac58dfc.slice. Feb 9 19:28:20.948064 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-898a1e0838cfbc7543ae4a6661de38a79eeea7c6ce63f94867eb12c66fc0bcb7-rootfs.mount: Deactivated successfully. Feb 9 19:28:20.963617 systemd[1]: Created slice kubepods-besteffort-pod49da16b9_492a_4550_8608_77a4393c3ae3.slice. Feb 9 19:28:21.015826 kubelet[2075]: I0209 19:28:21.015775 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dcn6z\" (UniqueName: \"kubernetes.io/projected/c9c6a162-5805-4458-8fcc-6dcfaac58dfc-kube-api-access-dcn6z\") pod \"coredns-5dd5756b68-2v4px\" (UID: \"c9c6a162-5805-4458-8fcc-6dcfaac58dfc\") " pod="kube-system/coredns-5dd5756b68-2v4px" Feb 9 19:28:21.016132 kubelet[2075]: I0209 19:28:21.015905 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/49da16b9-492a-4550-8608-77a4393c3ae3-tigera-ca-bundle\") pod \"calico-kube-controllers-78f6994685-27ng5\" (UID: \"49da16b9-492a-4550-8608-77a4393c3ae3\") " pod="calico-system/calico-kube-controllers-78f6994685-27ng5" Feb 9 19:28:21.016132 kubelet[2075]: I0209 19:28:21.015946 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c9c6a162-5805-4458-8fcc-6dcfaac58dfc-config-volume\") pod \"coredns-5dd5756b68-2v4px\" (UID: \"c9c6a162-5805-4458-8fcc-6dcfaac58dfc\") " pod="kube-system/coredns-5dd5756b68-2v4px" Feb 9 19:28:21.016132 kubelet[2075]: I0209 19:28:21.015979 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/95aa7307-05b7-4ac7-88c4-c4683637bf1d-config-volume\") pod \"coredns-5dd5756b68-bm2j6\" (UID: \"95aa7307-05b7-4ac7-88c4-c4683637bf1d\") " pod="kube-system/coredns-5dd5756b68-bm2j6" Feb 9 19:28:21.016132 kubelet[2075]: I0209 19:28:21.016057 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x8n59\" (UniqueName: \"kubernetes.io/projected/49da16b9-492a-4550-8608-77a4393c3ae3-kube-api-access-x8n59\") pod \"calico-kube-controllers-78f6994685-27ng5\" (UID: \"49da16b9-492a-4550-8608-77a4393c3ae3\") " pod="calico-system/calico-kube-controllers-78f6994685-27ng5" Feb 9 19:28:21.016132 kubelet[2075]: I0209 19:28:21.016090 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wftfq\" (UniqueName: \"kubernetes.io/projected/95aa7307-05b7-4ac7-88c4-c4683637bf1d-kube-api-access-wftfq\") pod \"coredns-5dd5756b68-bm2j6\" (UID: \"95aa7307-05b7-4ac7-88c4-c4683637bf1d\") " pod="kube-system/coredns-5dd5756b68-bm2j6" Feb 9 19:28:21.029203 systemd[1]: Created slice kubepods-besteffort-podf36f0162_fc14_49d3_a469_649f26287da4.slice. Feb 9 19:28:21.033105 env[1144]: time="2024-02-09T19:28:21.033034548Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qxx4b,Uid:f36f0162-fc14-49d3-a469-649f26287da4,Namespace:calico-system,Attempt:0,}" Feb 9 19:28:21.272400 env[1144]: time="2024-02-09T19:28:21.271241389Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78f6994685-27ng5,Uid:49da16b9-492a-4550-8608-77a4393c3ae3,Namespace:calico-system,Attempt:0,}" Feb 9 19:28:21.861867 env[1144]: time="2024-02-09T19:28:21.861788564Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-2v4px,Uid:c9c6a162-5805-4458-8fcc-6dcfaac58dfc,Namespace:kube-system,Attempt:0,}" Feb 9 19:28:21.999549 env[1144]: time="2024-02-09T19:28:21.999485506Z" level=info msg="shim disconnected" id=898a1e0838cfbc7543ae4a6661de38a79eeea7c6ce63f94867eb12c66fc0bcb7 Feb 9 19:28:21.999549 env[1144]: time="2024-02-09T19:28:21.999546613Z" level=warning msg="cleaning up after shim disconnected" id=898a1e0838cfbc7543ae4a6661de38a79eeea7c6ce63f94867eb12c66fc0bcb7 namespace=k8s.io Feb 9 19:28:22.000244 env[1144]: time="2024-02-09T19:28:21.999559779Z" level=info msg="cleaning up dead shim" Feb 9 19:28:22.051566 env[1144]: time="2024-02-09T19:28:22.051501496Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:28:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2814 runtime=io.containerd.runc.v2\n" Feb 9 19:28:22.133464 env[1144]: time="2024-02-09T19:28:22.133340178Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-bm2j6,Uid:95aa7307-05b7-4ac7-88c4-c4683637bf1d,Namespace:kube-system,Attempt:0,}" Feb 9 19:28:22.233190 env[1144]: time="2024-02-09T19:28:22.233115794Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:28:22.247735 env[1144]: time="2024-02-09T19:28:22.247637813Z" level=error msg="Failed to destroy network for sandbox \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:22.248466 env[1144]: time="2024-02-09T19:28:22.248410704Z" level=error msg="encountered an error cleaning up failed sandbox \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:22.248688 env[1144]: time="2024-02-09T19:28:22.248645862Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qxx4b,Uid:f36f0162-fc14-49d3-a469-649f26287da4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:22.250555 kubelet[2075]: E0209 19:28:22.249034 2075 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:22.250555 kubelet[2075]: E0209 19:28:22.249105 2075 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qxx4b" Feb 9 19:28:22.250555 kubelet[2075]: E0209 19:28:22.249139 2075 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qxx4b" Feb 9 19:28:22.252217 kubelet[2075]: E0209 19:28:22.249226 2075 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-qxx4b_calico-system(f36f0162-fc14-49d3-a469-649f26287da4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-qxx4b_calico-system(f36f0162-fc14-49d3-a469-649f26287da4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qxx4b" podUID="f36f0162-fc14-49d3-a469-649f26287da4" Feb 9 19:28:22.254089 env[1144]: time="2024-02-09T19:28:22.254042077Z" level=error msg="Failed to destroy network for sandbox \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:22.254684 env[1144]: time="2024-02-09T19:28:22.254636620Z" level=error msg="encountered an error cleaning up failed sandbox \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:22.254953 env[1144]: time="2024-02-09T19:28:22.254863950Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78f6994685-27ng5,Uid:49da16b9-492a-4550-8608-77a4393c3ae3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:22.255691 kubelet[2075]: E0209 19:28:22.255404 2075 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:22.255691 kubelet[2075]: E0209 19:28:22.255466 2075 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-78f6994685-27ng5" Feb 9 19:28:22.255691 kubelet[2075]: E0209 19:28:22.255501 2075 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-78f6994685-27ng5" Feb 9 19:28:22.255943 kubelet[2075]: E0209 19:28:22.255569 2075 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-78f6994685-27ng5_calico-system(49da16b9-492a-4550-8608-77a4393c3ae3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-78f6994685-27ng5_calico-system(49da16b9-492a-4550-8608-77a4393c3ae3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-78f6994685-27ng5" podUID="49da16b9-492a-4550-8608-77a4393c3ae3" Feb 9 19:28:22.263205 env[1144]: time="2024-02-09T19:28:22.263140206Z" level=error msg="Failed to destroy network for sandbox \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:22.263787 env[1144]: time="2024-02-09T19:28:22.263725807Z" level=error msg="encountered an error cleaning up failed sandbox \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:22.264004 env[1144]: time="2024-02-09T19:28:22.263932037Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-2v4px,Uid:c9c6a162-5805-4458-8fcc-6dcfaac58dfc,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:22.264210 kubelet[2075]: E0209 19:28:22.264155 2075 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:22.264335 kubelet[2075]: E0209 19:28:22.264222 2075 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-2v4px" Feb 9 19:28:22.264335 kubelet[2075]: E0209 19:28:22.264263 2075 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-2v4px" Feb 9 19:28:22.264335 kubelet[2075]: E0209 19:28:22.264328 2075 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-2v4px_kube-system(c9c6a162-5805-4458-8fcc-6dcfaac58dfc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-2v4px_kube-system(c9c6a162-5805-4458-8fcc-6dcfaac58dfc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-2v4px" podUID="c9c6a162-5805-4458-8fcc-6dcfaac58dfc" Feb 9 19:28:22.298364 env[1144]: time="2024-02-09T19:28:22.298275754Z" level=error msg="Failed to destroy network for sandbox \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:22.298778 env[1144]: time="2024-02-09T19:28:22.298715704Z" level=error msg="encountered an error cleaning up failed sandbox \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:22.298907 env[1144]: time="2024-02-09T19:28:22.298793497Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-bm2j6,Uid:95aa7307-05b7-4ac7-88c4-c4683637bf1d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:22.299229 kubelet[2075]: E0209 19:28:22.299197 2075 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:22.299379 kubelet[2075]: E0209 19:28:22.299278 2075 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-bm2j6" Feb 9 19:28:22.299379 kubelet[2075]: E0209 19:28:22.299312 2075 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-bm2j6" Feb 9 19:28:22.299502 kubelet[2075]: E0209 19:28:22.299382 2075 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-bm2j6_kube-system(95aa7307-05b7-4ac7-88c4-c4683637bf1d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-bm2j6_kube-system(95aa7307-05b7-4ac7-88c4-c4683637bf1d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-bm2j6" podUID="95aa7307-05b7-4ac7-88c4-c4683637bf1d" Feb 9 19:28:23.007374 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370-shm.mount: Deactivated successfully. Feb 9 19:28:23.007512 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f-shm.mount: Deactivated successfully. Feb 9 19:28:23.007617 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e-shm.mount: Deactivated successfully. Feb 9 19:28:23.237001 kubelet[2075]: I0209 19:28:23.236958 2075 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Feb 9 19:28:23.240490 env[1144]: time="2024-02-09T19:28:23.238438039Z" level=info msg="StopPodSandbox for \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\"" Feb 9 19:28:23.256295 kubelet[2075]: I0209 19:28:23.256245 2075 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Feb 9 19:28:23.260264 env[1144]: time="2024-02-09T19:28:23.259628194Z" level=info msg="StopPodSandbox for \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\"" Feb 9 19:28:23.263630 kubelet[2075]: I0209 19:28:23.263081 2075 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Feb 9 19:28:23.271907 env[1144]: time="2024-02-09T19:28:23.271854910Z" level=info msg="StopPodSandbox for \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\"" Feb 9 19:28:23.277108 kubelet[2075]: I0209 19:28:23.277006 2075 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Feb 9 19:28:23.278390 env[1144]: time="2024-02-09T19:28:23.278330716Z" level=info msg="StopPodSandbox for \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\"" Feb 9 19:28:23.374454 env[1144]: time="2024-02-09T19:28:23.374375030Z" level=error msg="StopPodSandbox for \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\" failed" error="failed to destroy network for sandbox \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:23.375154 kubelet[2075]: E0209 19:28:23.374900 2075 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Feb 9 19:28:23.375154 kubelet[2075]: E0209 19:28:23.374999 2075 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f"} Feb 9 19:28:23.375154 kubelet[2075]: E0209 19:28:23.375061 2075 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c9c6a162-5805-4458-8fcc-6dcfaac58dfc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:28:23.375154 kubelet[2075]: E0209 19:28:23.375111 2075 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c9c6a162-5805-4458-8fcc-6dcfaac58dfc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-2v4px" podUID="c9c6a162-5805-4458-8fcc-6dcfaac58dfc" Feb 9 19:28:23.402470 env[1144]: time="2024-02-09T19:28:23.402391570Z" level=error msg="StopPodSandbox for \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\" failed" error="failed to destroy network for sandbox \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:23.402853 kubelet[2075]: E0209 19:28:23.402826 2075 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Feb 9 19:28:23.402990 kubelet[2075]: E0209 19:28:23.402904 2075 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e"} Feb 9 19:28:23.402990 kubelet[2075]: E0209 19:28:23.402980 2075 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f36f0162-fc14-49d3-a469-649f26287da4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:28:23.403254 kubelet[2075]: E0209 19:28:23.403042 2075 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f36f0162-fc14-49d3-a469-649f26287da4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qxx4b" podUID="f36f0162-fc14-49d3-a469-649f26287da4" Feb 9 19:28:23.404028 env[1144]: time="2024-02-09T19:28:23.403972037Z" level=error msg="StopPodSandbox for \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\" failed" error="failed to destroy network for sandbox \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:23.404415 kubelet[2075]: E0209 19:28:23.404388 2075 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Feb 9 19:28:23.404534 kubelet[2075]: E0209 19:28:23.404452 2075 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370"} Feb 9 19:28:23.404534 kubelet[2075]: E0209 19:28:23.404521 2075 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"49da16b9-492a-4550-8608-77a4393c3ae3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:28:23.404713 kubelet[2075]: E0209 19:28:23.404562 2075 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"49da16b9-492a-4550-8608-77a4393c3ae3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-78f6994685-27ng5" podUID="49da16b9-492a-4550-8608-77a4393c3ae3" Feb 9 19:28:23.415568 env[1144]: time="2024-02-09T19:28:23.415498491Z" level=error msg="StopPodSandbox for \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\" failed" error="failed to destroy network for sandbox \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:28:23.415877 kubelet[2075]: E0209 19:28:23.415853 2075 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Feb 9 19:28:23.415988 kubelet[2075]: E0209 19:28:23.415902 2075 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4"} Feb 9 19:28:23.415988 kubelet[2075]: E0209 19:28:23.415981 2075 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"95aa7307-05b7-4ac7-88c4-c4683637bf1d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:28:23.416199 kubelet[2075]: E0209 19:28:23.416048 2075 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"95aa7307-05b7-4ac7-88c4-c4683637bf1d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-bm2j6" podUID="95aa7307-05b7-4ac7-88c4-c4683637bf1d" Feb 9 19:28:28.784469 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2439139207.mount: Deactivated successfully. Feb 9 19:28:28.847277 env[1144]: time="2024-02-09T19:28:28.847203231Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:28.850055 env[1144]: time="2024-02-09T19:28:28.850009777Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:28.852248 env[1144]: time="2024-02-09T19:28:28.852207792Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:28.854553 env[1144]: time="2024-02-09T19:28:28.854514654Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:28.855302 env[1144]: time="2024-02-09T19:28:28.855256470Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 19:28:28.879759 env[1144]: time="2024-02-09T19:28:28.879696416Z" level=info msg="CreateContainer within sandbox \"932de156454b190c9a360b46603db2ed4c2ad240293bdeec0b21261c670f8aa4\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:28:28.900779 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3512861970.mount: Deactivated successfully. Feb 9 19:28:28.907372 env[1144]: time="2024-02-09T19:28:28.907313729Z" level=info msg="CreateContainer within sandbox \"932de156454b190c9a360b46603db2ed4c2ad240293bdeec0b21261c670f8aa4\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7cb5ba0b5e7caada2e54dfcab3dea709918aa5f9cf5584084606cb0aec36854e\"" Feb 9 19:28:28.908374 env[1144]: time="2024-02-09T19:28:28.908337443Z" level=info msg="StartContainer for \"7cb5ba0b5e7caada2e54dfcab3dea709918aa5f9cf5584084606cb0aec36854e\"" Feb 9 19:28:28.935813 systemd[1]: Started cri-containerd-7cb5ba0b5e7caada2e54dfcab3dea709918aa5f9cf5584084606cb0aec36854e.scope. Feb 9 19:28:28.963000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.969865 kernel: kauditd_printk_skb: 40 callbacks suppressed Feb 9 19:28:28.970019 kernel: audit: type=1400 audit(1707506908.963:1180): avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.963000 audit[3045]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2568 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:29.025269 kernel: audit: type=1300 audit(1707506908.963:1180): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2568 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:28.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763623562613062356537636161646132653534646663616233646561 Feb 9 19:28:29.087768 kernel: audit: type=1327 audit(1707506908.963:1180): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763623562613062356537636161646132653534646663616233646561 Feb 9 19:28:29.087958 kernel: audit: type=1400 audit(1707506908.963:1181): avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.963000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.963000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:29.109415 kernel: audit: type=1400 audit(1707506908.963:1181): avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.963000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:29.130887 env[1144]: time="2024-02-09T19:28:29.126242833Z" level=info msg="StartContainer for \"7cb5ba0b5e7caada2e54dfcab3dea709918aa5f9cf5584084606cb0aec36854e\" returns successfully" Feb 9 19:28:29.131206 kernel: audit: type=1400 audit(1707506908.963:1181): avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.963000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:29.155203 kernel: audit: type=1400 audit(1707506908.963:1181): avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.963000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:29.177203 kernel: audit: type=1400 audit(1707506908.963:1181): avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.963000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:29.203227 kernel: audit: type=1400 audit(1707506908.963:1181): avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:29.203382 kernel: audit: type=1400 audit(1707506908.963:1181): avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.963000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.963000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.963000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.963000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.963000 audit: BPF prog-id=148 op=LOAD Feb 9 19:28:28.963000 audit[3045]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00034dbe0 items=0 ppid=2568 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:28.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763623562613062356537636161646132653534646663616233646561 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit: BPF prog-id=149 op=LOAD Feb 9 19:28:28.990000 audit[3045]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00034dc28 items=0 ppid=2568 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:28.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763623562613062356537636161646132653534646663616233646561 Feb 9 19:28:28.990000 audit: BPF prog-id=149 op=UNLOAD Feb 9 19:28:28.990000 audit: BPF prog-id=148 op=UNLOAD Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:28.990000 audit: BPF prog-id=150 op=LOAD Feb 9 19:28:28.990000 audit[3045]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00034dcb8 items=0 ppid=2568 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:28.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763623562613062356537636161646132653534646663616233646561 Feb 9 19:28:29.282524 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:28:29.282721 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:28:29.323785 kubelet[2075]: I0209 19:28:29.323723 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-9tlgc" podStartSLOduration=2.095055802 podCreationTimestamp="2024-02-09 19:28:09 +0000 UTC" firstStartedPulling="2024-02-09 19:28:10.627110292 +0000 UTC m=+20.875197077" lastFinishedPulling="2024-02-09 19:28:28.855693389 +0000 UTC m=+39.103780185" observedRunningTime="2024-02-09 19:28:29.321819735 +0000 UTC m=+39.569906540" watchObservedRunningTime="2024-02-09 19:28:29.32363891 +0000 UTC m=+39.571725785" Feb 9 19:28:30.326857 systemd[1]: run-containerd-runc-k8s.io-7cb5ba0b5e7caada2e54dfcab3dea709918aa5f9cf5584084606cb0aec36854e-runc.y1AmAO.mount: Deactivated successfully. Feb 9 19:28:30.801000 audit[3178]: AVC avc: denied { write } for pid=3178 comm="tee" name="fd" dev="proc" ino=23851 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:28:30.801000 audit[3178]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce384792a a2=241 a3=1b6 items=1 ppid=3151 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:30.801000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:28:30.801000 audit: PATH item=0 name="/dev/fd/63" inode=23842 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:28:30.801000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:28:30.814000 audit[3194]: AVC avc: denied { write } for pid=3194 comm="tee" name="fd" dev="proc" ino=23858 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:28:30.814000 audit[3194]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9b3cc929 a2=241 a3=1b6 items=1 ppid=3165 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:30.814000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:28:30.814000 audit: PATH item=0 name="/dev/fd/63" inode=23855 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:28:30.814000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:28:30.819000 audit[3180]: AVC avc: denied { write } for pid=3180 comm="tee" name="fd" dev="proc" ino=24688 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:28:30.821000 audit[3196]: AVC avc: denied { write } for pid=3196 comm="tee" name="fd" dev="proc" ino=24691 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:28:30.823000 audit[3200]: AVC avc: denied { write } for pid=3200 comm="tee" name="fd" dev="proc" ino=24694 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:28:30.819000 audit[3180]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffcf23391a a2=241 a3=1b6 items=1 ppid=3155 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:30.819000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:28:30.819000 audit: PATH item=0 name="/dev/fd/63" inode=24669 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:28:30.819000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:28:30.821000 audit[3196]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7cc4092b a2=241 a3=1b6 items=1 ppid=3156 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:30.821000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:28:30.821000 audit: PATH item=0 name="/dev/fd/63" inode=24680 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:28:30.821000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:28:30.823000 audit[3200]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee9529929 a2=241 a3=1b6 items=1 ppid=3168 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:30.823000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:28:30.823000 audit: PATH item=0 name="/dev/fd/63" inode=24683 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:28:30.823000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:28:30.875000 audit[3220]: AVC avc: denied { write } for pid=3220 comm="tee" name="fd" dev="proc" ino=23869 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:28:30.875000 audit[3220]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe2bbfc929 a2=241 a3=1b6 items=1 ppid=3152 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:30.875000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:28:30.875000 audit: PATH item=0 name="/dev/fd/63" inode=24708 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:28:30.875000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:28:30.883000 audit[3218]: AVC avc: denied { write } for pid=3218 comm="tee" name="fd" dev="proc" ino=23876 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:28:30.883000 audit[3218]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffebcf6f919 a2=241 a3=1b6 items=1 ppid=3159 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:30.883000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:28:30.883000 audit: PATH item=0 name="/dev/fd/63" inode=24707 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:28:30.883000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:28:31.434000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.434000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.434000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.434000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.434000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.434000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.434000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.434000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.434000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.434000 audit: BPF prog-id=151 op=LOAD Feb 9 19:28:31.434000 audit[3290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef0c579a0 a2=70 a3=7f36d3809000 items=0 ppid=3154 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:31.434000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:28:31.435000 audit: BPF prog-id=151 op=UNLOAD Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit: BPF prog-id=152 op=LOAD Feb 9 19:28:31.435000 audit[3290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef0c579a0 a2=70 a3=6e items=0 ppid=3154 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:31.435000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:28:31.435000 audit: BPF prog-id=152 op=UNLOAD Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffef0c57950 a2=70 a3=7ffef0c579a0 items=0 ppid=3154 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:31.435000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit: BPF prog-id=153 op=LOAD Feb 9 19:28:31.435000 audit[3290]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffef0c57930 a2=70 a3=7ffef0c579a0 items=0 ppid=3154 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:31.435000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:28:31.435000 audit: BPF prog-id=153 op=UNLOAD Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef0c57a10 a2=70 a3=0 items=0 ppid=3154 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:31.435000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef0c57a00 a2=70 a3=0 items=0 ppid=3154 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:31.435000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:28:31.435000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.435000 audit[3290]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffef0c57a40 a2=70 a3=0 items=0 ppid=3154 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:31.435000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:28:31.439000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.439000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.439000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.439000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.439000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.439000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.439000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.439000 audit[3290]: AVC avc: denied { perfmon } for pid=3290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.439000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.439000 audit[3290]: AVC avc: denied { bpf } for pid=3290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.439000 audit: BPF prog-id=154 op=LOAD Feb 9 19:28:31.439000 audit[3290]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffef0c57960 a2=70 a3=ffffffff items=0 ppid=3154 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:31.439000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:28:31.456000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.456000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd3a1f88a0 a2=70 a3=fff80800 items=0 ppid=3154 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:31.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:28:31.456000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:31.456000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd3a1f8770 a2=70 a3=3 items=0 ppid=3154 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:31.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:28:31.464000 audit: BPF prog-id=154 op=UNLOAD Feb 9 19:28:31.545000 audit[3317]: NETFILTER_CFG table=nat:97 family=2 entries=16 op=nft_register_chain pid=3317 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:28:31.545000 audit[3317]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffd4cb06f20 a2=0 a3=7ffd4cb06f0c items=0 ppid=3154 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:31.545000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:28:31.550000 audit[3315]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=3315 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:28:31.550000 audit[3315]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffea2832f20 a2=0 a3=55cf78797000 items=0 ppid=3154 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:31.550000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:28:31.551000 audit[3318]: NETFILTER_CFG table=mangle:99 family=2 entries=19 op=nft_register_chain pid=3318 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:28:31.551000 audit[3318]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffdc2e78e80 a2=0 a3=0 items=0 ppid=3154 pid=3318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:31.551000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:28:31.563000 audit[3322]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3322 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:28:31.563000 audit[3322]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffc35649fa0 a2=0 a3=7ffc35649f8c items=0 ppid=3154 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:31.563000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:28:32.243464 systemd-networkd[1027]: vxlan.calico: Link UP Feb 9 19:28:32.243479 systemd-networkd[1027]: vxlan.calico: Gained carrier Feb 9 19:28:34.022778 env[1144]: time="2024-02-09T19:28:34.022702032Z" level=info msg="StopPodSandbox for \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\"" Feb 9 19:28:34.083739 systemd-networkd[1027]: vxlan.calico: Gained IPv6LL Feb 9 19:28:34.123095 env[1144]: 2024-02-09 19:28:34.078 [INFO][3346] k8s.go 578: Cleaning up netns ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Feb 9 19:28:34.123095 env[1144]: 2024-02-09 19:28:34.079 [INFO][3346] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" iface="eth0" netns="/var/run/netns/cni-9879e245-5e2a-ab2d-f2ef-5907196059fd" Feb 9 19:28:34.123095 env[1144]: 2024-02-09 19:28:34.079 [INFO][3346] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" iface="eth0" netns="/var/run/netns/cni-9879e245-5e2a-ab2d-f2ef-5907196059fd" Feb 9 19:28:34.123095 env[1144]: 2024-02-09 19:28:34.079 [INFO][3346] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" iface="eth0" netns="/var/run/netns/cni-9879e245-5e2a-ab2d-f2ef-5907196059fd" Feb 9 19:28:34.123095 env[1144]: 2024-02-09 19:28:34.080 [INFO][3346] k8s.go 585: Releasing IP address(es) ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Feb 9 19:28:34.123095 env[1144]: 2024-02-09 19:28:34.080 [INFO][3346] utils.go 188: Calico CNI releasing IP address ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Feb 9 19:28:34.123095 env[1144]: 2024-02-09 19:28:34.109 [INFO][3354] ipam_plugin.go 415: Releasing address using handleID ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" HandleID="k8s-pod-network.3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" Feb 9 19:28:34.123095 env[1144]: 2024-02-09 19:28:34.109 [INFO][3354] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:28:34.123095 env[1144]: 2024-02-09 19:28:34.109 [INFO][3354] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:28:34.123095 env[1144]: 2024-02-09 19:28:34.118 [WARNING][3354] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" HandleID="k8s-pod-network.3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" Feb 9 19:28:34.123095 env[1144]: 2024-02-09 19:28:34.118 [INFO][3354] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" HandleID="k8s-pod-network.3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" Feb 9 19:28:34.123095 env[1144]: 2024-02-09 19:28:34.120 [INFO][3354] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:28:34.123095 env[1144]: 2024-02-09 19:28:34.121 [INFO][3346] k8s.go 591: Teardown processing complete. ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Feb 9 19:28:34.130009 env[1144]: time="2024-02-09T19:28:34.128320511Z" level=info msg="TearDown network for sandbox \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\" successfully" Feb 9 19:28:34.130009 env[1144]: time="2024-02-09T19:28:34.128373920Z" level=info msg="StopPodSandbox for \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\" returns successfully" Feb 9 19:28:34.130009 env[1144]: time="2024-02-09T19:28:34.129573664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-bm2j6,Uid:95aa7307-05b7-4ac7-88c4-c4683637bf1d,Namespace:kube-system,Attempt:1,}" Feb 9 19:28:34.126847 systemd[1]: run-netns-cni\x2d9879e245\x2d5e2a\x2dab2d\x2df2ef\x2d5907196059fd.mount: Deactivated successfully. Feb 9 19:28:34.297461 systemd-networkd[1027]: cali236d0914978: Link UP Feb 9 19:28:34.312401 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:28:34.312626 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali236d0914978: link becomes ready Feb 9 19:28:34.314826 systemd-networkd[1027]: cali236d0914978: Gained carrier Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.196 [INFO][3360] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0 coredns-5dd5756b68- kube-system 95aa7307-05b7-4ac7-88c4-c4683637bf1d 706 0 2024-02-09 19:28:04 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal coredns-5dd5756b68-bm2j6 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali236d0914978 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" Namespace="kube-system" Pod="coredns-5dd5756b68-bm2j6" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-" Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.197 [INFO][3360] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" Namespace="kube-system" Pod="coredns-5dd5756b68-bm2j6" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.242 [INFO][3372] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" HandleID="k8s-pod-network.d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.255 [INFO][3372] ipam_plugin.go 268: Auto assigning IP ContainerID="d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" HandleID="k8s-pod-network.d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027dac0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", "pod":"coredns-5dd5756b68-bm2j6", "timestamp":"2024-02-09 19:28:34.242743692 +0000 UTC"}, Hostname:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.256 [INFO][3372] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.256 [INFO][3372] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.256 [INFO][3372] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal' Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.258 [INFO][3372] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.262 [INFO][3372] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.267 [INFO][3372] ipam.go 489: Trying affinity for 192.168.110.128/26 host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.269 [INFO][3372] ipam.go 155: Attempting to load block cidr=192.168.110.128/26 host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.271 [INFO][3372] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.128/26 host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.271 [INFO][3372] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.128/26 handle="k8s-pod-network.d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.273 [INFO][3372] ipam.go 1682: Creating new handle: k8s-pod-network.d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.277 [INFO][3372] ipam.go 1203: Writing block in order to claim IPs block=192.168.110.128/26 handle="k8s-pod-network.d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.284 [INFO][3372] ipam.go 1216: Successfully claimed IPs: [192.168.110.129/26] block=192.168.110.128/26 handle="k8s-pod-network.d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.284 [INFO][3372] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.129/26] handle="k8s-pod-network.d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.284 [INFO][3372] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:28:34.329561 env[1144]: 2024-02-09 19:28:34.284 [INFO][3372] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.110.129/26] IPv6=[] ContainerID="d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" HandleID="k8s-pod-network.d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" Feb 9 19:28:34.330823 env[1144]: 2024-02-09 19:28:34.288 [INFO][3360] k8s.go 385: Populated endpoint ContainerID="d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" Namespace="kube-system" Pod="coredns-5dd5756b68-bm2j6" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"95aa7307-05b7-4ac7-88c4-c4683637bf1d", ResourceVersion:"706", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-5dd5756b68-bm2j6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali236d0914978", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:28:34.330823 env[1144]: 2024-02-09 19:28:34.288 [INFO][3360] k8s.go 386: Calico CNI using IPs: [192.168.110.129/32] ContainerID="d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" Namespace="kube-system" Pod="coredns-5dd5756b68-bm2j6" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" Feb 9 19:28:34.330823 env[1144]: 2024-02-09 19:28:34.288 [INFO][3360] dataplane_linux.go 68: Setting the host side veth name to cali236d0914978 ContainerID="d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" Namespace="kube-system" Pod="coredns-5dd5756b68-bm2j6" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" Feb 9 19:28:34.330823 env[1144]: 2024-02-09 19:28:34.317 [INFO][3360] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" Namespace="kube-system" Pod="coredns-5dd5756b68-bm2j6" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" Feb 9 19:28:34.330823 env[1144]: 2024-02-09 19:28:34.317 [INFO][3360] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" Namespace="kube-system" Pod="coredns-5dd5756b68-bm2j6" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"95aa7307-05b7-4ac7-88c4-c4683637bf1d", ResourceVersion:"706", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf", Pod:"coredns-5dd5756b68-bm2j6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali236d0914978", MAC:"92:eb:41:e2:bf:87", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:28:34.330823 env[1144]: 2024-02-09 19:28:34.327 [INFO][3360] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf" Namespace="kube-system" Pod="coredns-5dd5756b68-bm2j6" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" Feb 9 19:28:34.368847 env[1144]: time="2024-02-09T19:28:34.368753467Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:28:34.369159 env[1144]: time="2024-02-09T19:28:34.369110118Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:28:34.369432 env[1144]: time="2024-02-09T19:28:34.369383793Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:28:34.369807 env[1144]: time="2024-02-09T19:28:34.369760002Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf pid=3398 runtime=io.containerd.runc.v2 Feb 9 19:28:34.399000 audit[3418]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3418 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:28:34.421210 kernel: kauditd_printk_skb: 151 callbacks suppressed Feb 9 19:28:34.421398 kernel: audit: type=1325 audit(1707506914.399:1211): table=filter:101 family=2 entries=36 op=nft_register_chain pid=3418 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:28:34.406506 systemd[1]: Started cri-containerd-d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf.scope. Feb 9 19:28:34.399000 audit[3418]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffccfd597f0 a2=0 a3=7ffccfd597dc items=0 ppid=3154 pid=3418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:34.430224 systemd[1]: run-containerd-runc-k8s.io-d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf-runc.7SERRW.mount: Deactivated successfully. Feb 9 19:28:34.460403 kernel: audit: type=1300 audit(1707506914.399:1211): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffccfd597f0 a2=0 a3=7ffccfd597dc items=0 ppid=3154 pid=3418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:34.460541 kernel: audit: type=1327 audit(1707506914.399:1211): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:28:34.399000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:28:34.501349 kernel: audit: type=1400 audit(1707506914.458:1212): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.558200 kernel: audit: type=1400 audit(1707506914.458:1213): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.558372 kernel: audit: type=1400 audit(1707506914.458:1214): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.580372 kernel: audit: type=1400 audit(1707506914.458:1215): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.580613 kernel: audit: type=1400 audit(1707506914.458:1216): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.590053 env[1144]: time="2024-02-09T19:28:34.589993953Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-bm2j6,Uid:95aa7307-05b7-4ac7-88c4-c4683637bf1d,Namespace:kube-system,Attempt:1,} returns sandbox id \"d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf\"" Feb 9 19:28:34.600338 env[1144]: time="2024-02-09T19:28:34.600282133Z" level=info msg="CreateContainer within sandbox \"d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:28:34.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.622871 kernel: audit: type=1400 audit(1707506914.458:1217): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.458000 audit: BPF prog-id=155 op=LOAD Feb 9 19:28:34.459000 audit[3411]: AVC avc: denied { bpf } for pid=3411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.459000 audit[3411]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3398 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:34.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323233373235323061353937633137623162373332373533356131 Feb 9 19:28:34.459000 audit[3411]: AVC avc: denied { perfmon } for pid=3411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.459000 audit[3411]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3398 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:34.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323233373235323061353937633137623162373332373533356131 Feb 9 19:28:34.459000 audit[3411]: AVC avc: denied { bpf } for pid=3411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.459000 audit[3411]: AVC avc: denied { bpf } for pid=3411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.459000 audit[3411]: AVC avc: denied { bpf } for pid=3411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.459000 audit[3411]: AVC avc: denied { perfmon } for pid=3411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.459000 audit[3411]: AVC avc: denied { perfmon } for pid=3411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.645253 kernel: audit: type=1400 audit(1707506914.458:1218): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.459000 audit[3411]: AVC avc: denied { perfmon } for pid=3411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.459000 audit[3411]: AVC avc: denied { perfmon } for pid=3411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.459000 audit[3411]: AVC avc: denied { perfmon } for pid=3411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.459000 audit[3411]: AVC avc: denied { bpf } for pid=3411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.459000 audit[3411]: AVC avc: denied { bpf } for pid=3411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.459000 audit: BPF prog-id=156 op=LOAD Feb 9 19:28:34.459000 audit[3411]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000226190 items=0 ppid=3398 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:34.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323233373235323061353937633137623162373332373533356131 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { bpf } for pid=3411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { bpf } for pid=3411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { perfmon } for pid=3411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { perfmon } for pid=3411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { perfmon } for pid=3411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { perfmon } for pid=3411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { perfmon } for pid=3411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { bpf } for pid=3411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { bpf } for pid=3411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit: BPF prog-id=157 op=LOAD Feb 9 19:28:34.500000 audit[3411]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00035a3e8 items=0 ppid=3398 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:34.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323233373235323061353937633137623162373332373533356131 Feb 9 19:28:34.500000 audit: BPF prog-id=157 op=UNLOAD Feb 9 19:28:34.500000 audit: BPF prog-id=156 op=UNLOAD Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { bpf } for pid=3411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { bpf } for pid=3411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { bpf } for pid=3411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { perfmon } for pid=3411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { perfmon } for pid=3411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { perfmon } for pid=3411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { perfmon } for pid=3411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { perfmon } for pid=3411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { bpf } for pid=3411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit[3411]: AVC avc: denied { bpf } for pid=3411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.500000 audit: BPF prog-id=158 op=LOAD Feb 9 19:28:34.500000 audit[3411]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00035a7f8 items=0 ppid=3398 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:34.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323233373235323061353937633137623162373332373533356131 Feb 9 19:28:34.657781 env[1144]: time="2024-02-09T19:28:34.657717845Z" level=info msg="CreateContainer within sandbox \"d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"15a1f5a85a03d3505fb6c3874aad236972bbd1e445bd524f3ce9e41536d91a5f\"" Feb 9 19:28:34.660707 env[1144]: time="2024-02-09T19:28:34.660666286Z" level=info msg="StartContainer for \"15a1f5a85a03d3505fb6c3874aad236972bbd1e445bd524f3ce9e41536d91a5f\"" Feb 9 19:28:34.683205 systemd[1]: Started cri-containerd-15a1f5a85a03d3505fb6c3874aad236972bbd1e445bd524f3ce9e41536d91a5f.scope. Feb 9 19:28:34.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.704000 audit: BPF prog-id=159 op=LOAD Feb 9 19:28:34.705000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.705000 audit[3445]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3398 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:34.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135613166356138356130336433353035666236633338373461616432 Feb 9 19:28:34.705000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.705000 audit[3445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3398 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:34.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135613166356138356130336433353035666236633338373461616432 Feb 9 19:28:34.706000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.706000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.706000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.706000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.706000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.706000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.706000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.706000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.706000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.706000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.706000 audit: BPF prog-id=160 op=LOAD Feb 9 19:28:34.706000 audit[3445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000313a90 items=0 ppid=3398 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:34.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135613166356138356130336433353035666236633338373461616432 Feb 9 19:28:34.707000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.707000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.707000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.707000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.707000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.707000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.707000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.707000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.707000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.707000 audit: BPF prog-id=161 op=LOAD Feb 9 19:28:34.707000 audit[3445]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000313ad8 items=0 ppid=3398 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:34.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135613166356138356130336433353035666236633338373461616432 Feb 9 19:28:34.708000 audit: BPF prog-id=161 op=UNLOAD Feb 9 19:28:34.708000 audit: BPF prog-id=160 op=UNLOAD Feb 9 19:28:34.709000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.709000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.709000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.709000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.709000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.709000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.709000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.709000 audit[3445]: AVC avc: denied { perfmon } for pid=3445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.709000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.709000 audit[3445]: AVC avc: denied { bpf } for pid=3445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:34.709000 audit: BPF prog-id=162 op=LOAD Feb 9 19:28:34.709000 audit[3445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000313ee8 items=0 ppid=3398 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:34.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135613166356138356130336433353035666236633338373461616432 Feb 9 19:28:34.740453 env[1144]: time="2024-02-09T19:28:34.740394227Z" level=info msg="StartContainer for \"15a1f5a85a03d3505fb6c3874aad236972bbd1e445bd524f3ce9e41536d91a5f\" returns successfully" Feb 9 19:28:35.021725 env[1144]: time="2024-02-09T19:28:35.021565640Z" level=info msg="StopPodSandbox for \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\"" Feb 9 19:28:35.025297 env[1144]: time="2024-02-09T19:28:35.022129697Z" level=info msg="StopPodSandbox for \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\"" Feb 9 19:28:35.197114 env[1144]: 2024-02-09 19:28:35.111 [INFO][3504] k8s.go 578: Cleaning up netns ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Feb 9 19:28:35.197114 env[1144]: 2024-02-09 19:28:35.111 [INFO][3504] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" iface="eth0" netns="/var/run/netns/cni-7e1921e2-942f-b577-3ecb-3500d6335c8a" Feb 9 19:28:35.197114 env[1144]: 2024-02-09 19:28:35.112 [INFO][3504] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" iface="eth0" netns="/var/run/netns/cni-7e1921e2-942f-b577-3ecb-3500d6335c8a" Feb 9 19:28:35.197114 env[1144]: 2024-02-09 19:28:35.112 [INFO][3504] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" iface="eth0" netns="/var/run/netns/cni-7e1921e2-942f-b577-3ecb-3500d6335c8a" Feb 9 19:28:35.197114 env[1144]: 2024-02-09 19:28:35.112 [INFO][3504] k8s.go 585: Releasing IP address(es) ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Feb 9 19:28:35.197114 env[1144]: 2024-02-09 19:28:35.112 [INFO][3504] utils.go 188: Calico CNI releasing IP address ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Feb 9 19:28:35.197114 env[1144]: 2024-02-09 19:28:35.178 [INFO][3515] ipam_plugin.go 415: Releasing address using handleID ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" HandleID="k8s-pod-network.79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" Feb 9 19:28:35.197114 env[1144]: 2024-02-09 19:28:35.179 [INFO][3515] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:28:35.197114 env[1144]: 2024-02-09 19:28:35.179 [INFO][3515] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:28:35.197114 env[1144]: 2024-02-09 19:28:35.188 [WARNING][3515] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" HandleID="k8s-pod-network.79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" Feb 9 19:28:35.197114 env[1144]: 2024-02-09 19:28:35.188 [INFO][3515] ipam_plugin.go 443: Releasing address using workloadID ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" HandleID="k8s-pod-network.79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" Feb 9 19:28:35.197114 env[1144]: 2024-02-09 19:28:35.190 [INFO][3515] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:28:35.197114 env[1144]: 2024-02-09 19:28:35.195 [INFO][3504] k8s.go 591: Teardown processing complete. ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Feb 9 19:28:35.200995 systemd[1]: run-netns-cni\x2d7e1921e2\x2d942f\x2db577\x2d3ecb\x2d3500d6335c8a.mount: Deactivated successfully. Feb 9 19:28:35.202761 env[1144]: time="2024-02-09T19:28:35.202661251Z" level=info msg="TearDown network for sandbox \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\" successfully" Feb 9 19:28:35.202761 env[1144]: time="2024-02-09T19:28:35.202713735Z" level=info msg="StopPodSandbox for \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\" returns successfully" Feb 9 19:28:35.207249 env[1144]: time="2024-02-09T19:28:35.207184275Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78f6994685-27ng5,Uid:49da16b9-492a-4550-8608-77a4393c3ae3,Namespace:calico-system,Attempt:1,}" Feb 9 19:28:35.217325 env[1144]: 2024-02-09 19:28:35.122 [INFO][3503] k8s.go 578: Cleaning up netns ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Feb 9 19:28:35.217325 env[1144]: 2024-02-09 19:28:35.122 [INFO][3503] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" iface="eth0" netns="/var/run/netns/cni-abc21002-6821-2368-9cfc-49b2da332a07" Feb 9 19:28:35.217325 env[1144]: 2024-02-09 19:28:35.122 [INFO][3503] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" iface="eth0" netns="/var/run/netns/cni-abc21002-6821-2368-9cfc-49b2da332a07" Feb 9 19:28:35.217325 env[1144]: 2024-02-09 19:28:35.129 [INFO][3503] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" iface="eth0" netns="/var/run/netns/cni-abc21002-6821-2368-9cfc-49b2da332a07" Feb 9 19:28:35.217325 env[1144]: 2024-02-09 19:28:35.129 [INFO][3503] k8s.go 585: Releasing IP address(es) ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Feb 9 19:28:35.217325 env[1144]: 2024-02-09 19:28:35.129 [INFO][3503] utils.go 188: Calico CNI releasing IP address ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Feb 9 19:28:35.217325 env[1144]: 2024-02-09 19:28:35.178 [INFO][3519] ipam_plugin.go 415: Releasing address using handleID ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" HandleID="k8s-pod-network.b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" Feb 9 19:28:35.217325 env[1144]: 2024-02-09 19:28:35.179 [INFO][3519] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:28:35.217325 env[1144]: 2024-02-09 19:28:35.190 [INFO][3519] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:28:35.217325 env[1144]: 2024-02-09 19:28:35.207 [WARNING][3519] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" HandleID="k8s-pod-network.b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" Feb 9 19:28:35.217325 env[1144]: 2024-02-09 19:28:35.207 [INFO][3519] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" HandleID="k8s-pod-network.b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" Feb 9 19:28:35.217325 env[1144]: 2024-02-09 19:28:35.211 [INFO][3519] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:28:35.217325 env[1144]: 2024-02-09 19:28:35.213 [INFO][3503] k8s.go 591: Teardown processing complete. ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Feb 9 19:28:35.218340 env[1144]: time="2024-02-09T19:28:35.218287735Z" level=info msg="TearDown network for sandbox \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\" successfully" Feb 9 19:28:35.219362 env[1144]: time="2024-02-09T19:28:35.218463876Z" level=info msg="StopPodSandbox for \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\" returns successfully" Feb 9 19:28:35.226625 systemd[1]: run-netns-cni\x2dabc21002\x2d6821\x2d2368\x2d9cfc\x2d49b2da332a07.mount: Deactivated successfully. Feb 9 19:28:35.229700 env[1144]: time="2024-02-09T19:28:35.229642496Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qxx4b,Uid:f36f0162-fc14-49d3-a469-649f26287da4,Namespace:calico-system,Attempt:1,}" Feb 9 19:28:35.341224 kubelet[2075]: I0209 19:28:35.338864 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-bm2j6" podStartSLOduration=31.33880909 podCreationTimestamp="2024-02-09 19:28:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:28:35.337339245 +0000 UTC m=+45.585426054" watchObservedRunningTime="2024-02-09 19:28:35.33880909 +0000 UTC m=+45.586895899" Feb 9 19:28:35.397000 audit[3562]: NETFILTER_CFG table=filter:102 family=2 entries=11 op=nft_register_rule pid=3562 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:35.397000 audit[3562]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc65b506d0 a2=0 a3=7ffc65b506bc items=0 ppid=2259 pid=3562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:35.397000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:35.411000 audit[3562]: NETFILTER_CFG table=nat:103 family=2 entries=35 op=nft_register_chain pid=3562 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:35.411000 audit[3562]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffc65b506d0 a2=0 a3=7ffc65b506bc items=0 ppid=2259 pid=3562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:35.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:35.450000 audit[3566]: NETFILTER_CFG table=filter:104 family=2 entries=8 op=nft_register_rule pid=3566 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:35.450000 audit[3566]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdfcd6d450 a2=0 a3=7ffdfcd6d43c items=0 ppid=2259 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:35.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:35.458000 audit[3566]: NETFILTER_CFG table=nat:105 family=2 entries=20 op=nft_register_rule pid=3566 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:35.458000 audit[3566]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffdfcd6d450 a2=0 a3=7ffdfcd6d43c items=0 ppid=2259 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:35.458000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:35.519861 systemd-networkd[1027]: caliedc428fc7d3: Link UP Feb 9 19:28:35.527220 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:28:35.536349 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliedc428fc7d3: link becomes ready Feb 9 19:28:35.537616 systemd-networkd[1027]: caliedc428fc7d3: Gained carrier Feb 9 19:28:35.555788 systemd-networkd[1027]: cali236d0914978: Gained IPv6LL Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.309 [INFO][3527] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0 calico-kube-controllers-78f6994685- calico-system 49da16b9-492a-4550-8608-77a4393c3ae3 717 0 2024-02-09 19:28:09 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:78f6994685 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal calico-kube-controllers-78f6994685-27ng5 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] caliedc428fc7d3 [] []}} ContainerID="f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" Namespace="calico-system" Pod="calico-kube-controllers-78f6994685-27ng5" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-" Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.309 [INFO][3527] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" Namespace="calico-system" Pod="calico-kube-controllers-78f6994685-27ng5" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.451 [INFO][3552] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" HandleID="k8s-pod-network.f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.473 [INFO][3552] ipam_plugin.go 268: Auto assigning IP ContainerID="f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" HandleID="k8s-pod-network.f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bfac0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", "pod":"calico-kube-controllers-78f6994685-27ng5", "timestamp":"2024-02-09 19:28:35.451643984 +0000 UTC"}, Hostname:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.473 [INFO][3552] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.473 [INFO][3552] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.473 [INFO][3552] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal' Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.478 [INFO][3552] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.488 [INFO][3552] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.494 [INFO][3552] ipam.go 489: Trying affinity for 192.168.110.128/26 host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.497 [INFO][3552] ipam.go 155: Attempting to load block cidr=192.168.110.128/26 host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.500 [INFO][3552] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.128/26 host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.500 [INFO][3552] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.128/26 handle="k8s-pod-network.f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.502 [INFO][3552] ipam.go 1682: Creating new handle: k8s-pod-network.f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.507 [INFO][3552] ipam.go 1203: Writing block in order to claim IPs block=192.168.110.128/26 handle="k8s-pod-network.f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.514 [INFO][3552] ipam.go 1216: Successfully claimed IPs: [192.168.110.130/26] block=192.168.110.128/26 handle="k8s-pod-network.f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.514 [INFO][3552] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.130/26] handle="k8s-pod-network.f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.514 [INFO][3552] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:28:35.561707 env[1144]: 2024-02-09 19:28:35.515 [INFO][3552] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.110.130/26] IPv6=[] ContainerID="f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" HandleID="k8s-pod-network.f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" Feb 9 19:28:35.563042 env[1144]: 2024-02-09 19:28:35.516 [INFO][3527] k8s.go 385: Populated endpoint ContainerID="f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" Namespace="calico-system" Pod="calico-kube-controllers-78f6994685-27ng5" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0", GenerateName:"calico-kube-controllers-78f6994685-", Namespace:"calico-system", SelfLink:"", UID:"49da16b9-492a-4550-8608-77a4393c3ae3", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78f6994685", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-78f6994685-27ng5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliedc428fc7d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:28:35.563042 env[1144]: 2024-02-09 19:28:35.517 [INFO][3527] k8s.go 386: Calico CNI using IPs: [192.168.110.130/32] ContainerID="f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" Namespace="calico-system" Pod="calico-kube-controllers-78f6994685-27ng5" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" Feb 9 19:28:35.563042 env[1144]: 2024-02-09 19:28:35.517 [INFO][3527] dataplane_linux.go 68: Setting the host side veth name to caliedc428fc7d3 ContainerID="f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" Namespace="calico-system" Pod="calico-kube-controllers-78f6994685-27ng5" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" Feb 9 19:28:35.563042 env[1144]: 2024-02-09 19:28:35.539 [INFO][3527] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" Namespace="calico-system" Pod="calico-kube-controllers-78f6994685-27ng5" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" Feb 9 19:28:35.563042 env[1144]: 2024-02-09 19:28:35.541 [INFO][3527] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" Namespace="calico-system" Pod="calico-kube-controllers-78f6994685-27ng5" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0", GenerateName:"calico-kube-controllers-78f6994685-", Namespace:"calico-system", SelfLink:"", UID:"49da16b9-492a-4550-8608-77a4393c3ae3", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78f6994685", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb", Pod:"calico-kube-controllers-78f6994685-27ng5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliedc428fc7d3", MAC:"8a:18:9d:85:c3:bf", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:28:35.563042 env[1144]: 2024-02-09 19:28:35.560 [INFO][3527] k8s.go 491: Wrote updated endpoint to datastore ContainerID="f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb" Namespace="calico-system" Pod="calico-kube-controllers-78f6994685-27ng5" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" Feb 9 19:28:35.596943 systemd-networkd[1027]: cali62089dc7e5d: Link UP Feb 9 19:28:35.609327 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali62089dc7e5d: link becomes ready Feb 9 19:28:35.609670 env[1144]: time="2024-02-09T19:28:35.609582457Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:28:35.609861 env[1144]: time="2024-02-09T19:28:35.609636758Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:28:35.609861 env[1144]: time="2024-02-09T19:28:35.609744128Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:28:35.610083 env[1144]: time="2024-02-09T19:28:35.609931775Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb pid=3590 runtime=io.containerd.runc.v2 Feb 9 19:28:35.611077 systemd-networkd[1027]: cali62089dc7e5d: Gained carrier Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.368 [INFO][3538] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0 csi-node-driver- calico-system f36f0162-fc14-49d3-a469-649f26287da4 718 0 2024-02-09 19:28:09 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal csi-node-driver-qxx4b eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali62089dc7e5d [] []}} ContainerID="93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" Namespace="calico-system" Pod="csi-node-driver-qxx4b" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-" Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.368 [INFO][3538] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" Namespace="calico-system" Pod="csi-node-driver-qxx4b" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.451 [INFO][3558] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" HandleID="k8s-pod-network.93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.484 [INFO][3558] ipam_plugin.go 268: Auto assigning IP ContainerID="93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" HandleID="k8s-pod-network.93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000291480), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", "pod":"csi-node-driver-qxx4b", "timestamp":"2024-02-09 19:28:35.451398791 +0000 UTC"}, Hostname:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.484 [INFO][3558] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.514 [INFO][3558] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.514 [INFO][3558] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal' Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.536 [INFO][3558] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.545 [INFO][3558] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.557 [INFO][3558] ipam.go 489: Trying affinity for 192.168.110.128/26 host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.564 [INFO][3558] ipam.go 155: Attempting to load block cidr=192.168.110.128/26 host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.569 [INFO][3558] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.128/26 host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.569 [INFO][3558] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.128/26 handle="k8s-pod-network.93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.572 [INFO][3558] ipam.go 1682: Creating new handle: k8s-pod-network.93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.579 [INFO][3558] ipam.go 1203: Writing block in order to claim IPs block=192.168.110.128/26 handle="k8s-pod-network.93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.592 [INFO][3558] ipam.go 1216: Successfully claimed IPs: [192.168.110.131/26] block=192.168.110.128/26 handle="k8s-pod-network.93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.592 [INFO][3558] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.131/26] handle="k8s-pod-network.93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.592 [INFO][3558] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:28:35.634370 env[1144]: 2024-02-09 19:28:35.592 [INFO][3558] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.110.131/26] IPv6=[] ContainerID="93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" HandleID="k8s-pod-network.93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" Feb 9 19:28:35.635624 env[1144]: 2024-02-09 19:28:35.594 [INFO][3538] k8s.go 385: Populated endpoint ContainerID="93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" Namespace="calico-system" Pod="csi-node-driver-qxx4b" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f36f0162-fc14-49d3-a469-649f26287da4", ResourceVersion:"718", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-qxx4b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali62089dc7e5d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:28:35.635624 env[1144]: 2024-02-09 19:28:35.594 [INFO][3538] k8s.go 386: Calico CNI using IPs: [192.168.110.131/32] ContainerID="93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" Namespace="calico-system" Pod="csi-node-driver-qxx4b" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" Feb 9 19:28:35.635624 env[1144]: 2024-02-09 19:28:35.594 [INFO][3538] dataplane_linux.go 68: Setting the host side veth name to cali62089dc7e5d ContainerID="93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" Namespace="calico-system" Pod="csi-node-driver-qxx4b" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" Feb 9 19:28:35.635624 env[1144]: 2024-02-09 19:28:35.598 [INFO][3538] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" Namespace="calico-system" Pod="csi-node-driver-qxx4b" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" Feb 9 19:28:35.635624 env[1144]: 2024-02-09 19:28:35.612 [INFO][3538] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" Namespace="calico-system" Pod="csi-node-driver-qxx4b" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f36f0162-fc14-49d3-a469-649f26287da4", ResourceVersion:"718", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd", Pod:"csi-node-driver-qxx4b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali62089dc7e5d", MAC:"3a:1c:00:26:27:42", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:28:35.635624 env[1144]: 2024-02-09 19:28:35.632 [INFO][3538] k8s.go 491: Wrote updated endpoint to datastore ContainerID="93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd" Namespace="calico-system" Pod="csi-node-driver-qxx4b" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" Feb 9 19:28:35.661831 systemd[1]: Started cri-containerd-f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb.scope. Feb 9 19:28:35.671527 env[1144]: time="2024-02-09T19:28:35.671430546Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:28:35.671800 env[1144]: time="2024-02-09T19:28:35.671756789Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:28:35.671976 env[1144]: time="2024-02-09T19:28:35.671939340Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:28:35.672606 env[1144]: time="2024-02-09T19:28:35.672545974Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd pid=3629 runtime=io.containerd.runc.v2 Feb 9 19:28:35.672000 audit[3619]: NETFILTER_CFG table=filter:106 family=2 entries=40 op=nft_register_chain pid=3619 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:28:35.672000 audit[3619]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffc11183810 a2=0 a3=7ffc111837fc items=0 ppid=3154 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:35.672000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:28:35.699793 systemd[1]: Started cri-containerd-93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd.scope. Feb 9 19:28:35.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.738000 audit: BPF prog-id=163 op=LOAD Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3590 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:35.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333363343331623564333861326637616236626466366563346535 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3590 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:35.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333363343331623564333861326637616236626466366563346535 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit: BPF prog-id=164 op=LOAD Feb 9 19:28:35.739000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000302d90 items=0 ppid=3590 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:35.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333363343331623564333861326637616236626466366563346535 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit: BPF prog-id=165 op=LOAD Feb 9 19:28:35.739000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000302dd8 items=0 ppid=3590 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:35.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333363343331623564333861326637616236626466366563346535 Feb 9 19:28:35.739000 audit: BPF prog-id=165 op=UNLOAD Feb 9 19:28:35.739000 audit: BPF prog-id=164 op=UNLOAD Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { perfmon } for pid=3602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit[3602]: AVC avc: denied { bpf } for pid=3602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.739000 audit: BPF prog-id=166 op=LOAD Feb 9 19:28:35.739000 audit[3602]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003031e8 items=0 ppid=3590 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:35.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333363343331623564333861326637616236626466366563346535 Feb 9 19:28:35.753000 audit[3670]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=3670 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:28:35.753000 audit[3670]: SYSCALL arch=c000003e syscall=46 success=yes exit=19508 a0=3 a1=7ffd752a07c0 a2=0 a3=7ffd752a07ac items=0 ppid=3154 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:35.753000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:28:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.764000 audit: BPF prog-id=167 op=LOAD Feb 9 19:28:35.765000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.765000 audit[3641]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3629 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:35.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933643661633361356663393138383734656231393066333464396438 Feb 9 19:28:35.765000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.765000 audit[3641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3629 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:35.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933643661633361356663393138383734656231393066333464396438 Feb 9 19:28:35.765000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.765000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.765000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.765000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.765000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.765000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.765000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.765000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.765000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.765000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.765000 audit: BPF prog-id=168 op=LOAD Feb 9 19:28:35.765000 audit[3641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003b88e0 items=0 ppid=3629 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:35.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933643661633361356663393138383734656231393066333464396438 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit: BPF prog-id=169 op=LOAD Feb 9 19:28:35.766000 audit[3641]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003b8928 items=0 ppid=3629 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:35.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933643661633361356663393138383734656231393066333464396438 Feb 9 19:28:35.766000 audit: BPF prog-id=169 op=UNLOAD Feb 9 19:28:35.766000 audit: BPF prog-id=168 op=UNLOAD Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:35.766000 audit: BPF prog-id=170 op=LOAD Feb 9 19:28:35.766000 audit[3641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003b8d38 items=0 ppid=3629 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:35.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933643661633361356663393138383734656231393066333464396438 Feb 9 19:28:35.789962 env[1144]: time="2024-02-09T19:28:35.789897734Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qxx4b,Uid:f36f0162-fc14-49d3-a469-649f26287da4,Namespace:calico-system,Attempt:1,} returns sandbox id \"93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd\"" Feb 9 19:28:35.795535 env[1144]: time="2024-02-09T19:28:35.795481022Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:28:35.815511 env[1144]: time="2024-02-09T19:28:35.815433239Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78f6994685-27ng5,Uid:49da16b9-492a-4550-8608-77a4393c3ae3,Namespace:calico-system,Attempt:1,} returns sandbox id \"f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb\"" Feb 9 19:28:36.768785 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3656788305.mount: Deactivated successfully. Feb 9 19:28:37.091948 systemd-networkd[1027]: caliedc428fc7d3: Gained IPv6LL Feb 9 19:28:37.187046 env[1144]: time="2024-02-09T19:28:37.186980145Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:37.190933 env[1144]: time="2024-02-09T19:28:37.190756487Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:37.194671 env[1144]: time="2024-02-09T19:28:37.194628741Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:37.197063 env[1144]: time="2024-02-09T19:28:37.197019920Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:37.198020 env[1144]: time="2024-02-09T19:28:37.197980386Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 19:28:37.201223 env[1144]: time="2024-02-09T19:28:37.199840168Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 19:28:37.203674 env[1144]: time="2024-02-09T19:28:37.203621524Z" level=info msg="CreateContainer within sandbox \"93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:28:37.226517 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2090576352.mount: Deactivated successfully. Feb 9 19:28:37.232159 env[1144]: time="2024-02-09T19:28:37.232094187Z" level=info msg="CreateContainer within sandbox \"93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"c2892ca82ed8861492ff5cbfd03c4df5c143275d72c941d0c25d294fa829bef1\"" Feb 9 19:28:37.235070 env[1144]: time="2024-02-09T19:28:37.233135580Z" level=info msg="StartContainer for \"c2892ca82ed8861492ff5cbfd03c4df5c143275d72c941d0c25d294fa829bef1\"" Feb 9 19:28:37.284298 systemd[1]: run-containerd-runc-k8s.io-c2892ca82ed8861492ff5cbfd03c4df5c143275d72c941d0c25d294fa829bef1-runc.SOnfy4.mount: Deactivated successfully. Feb 9 19:28:37.284826 systemd-networkd[1027]: cali62089dc7e5d: Gained IPv6LL Feb 9 19:28:37.289888 systemd[1]: Started cri-containerd-c2892ca82ed8861492ff5cbfd03c4df5c143275d72c941d0c25d294fa829bef1.scope. Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3629 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:37.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332383932636138326564383836313439326666356362666430336334 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit: BPF prog-id=171 op=LOAD Feb 9 19:28:37.313000 audit[3696]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000365e60 items=0 ppid=3629 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:37.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332383932636138326564383836313439326666356362666430336334 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit: BPF prog-id=172 op=LOAD Feb 9 19:28:37.313000 audit[3696]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000365ea8 items=0 ppid=3629 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:37.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332383932636138326564383836313439326666356362666430336334 Feb 9 19:28:37.313000 audit: BPF prog-id=172 op=UNLOAD Feb 9 19:28:37.313000 audit: BPF prog-id=171 op=UNLOAD Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:37.313000 audit: BPF prog-id=173 op=LOAD Feb 9 19:28:37.313000 audit[3696]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000365f38 items=0 ppid=3629 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:37.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332383932636138326564383836313439326666356362666430336334 Feb 9 19:28:37.347006 env[1144]: time="2024-02-09T19:28:37.344333475Z" level=info msg="StartContainer for \"c2892ca82ed8861492ff5cbfd03c4df5c143275d72c941d0c25d294fa829bef1\" returns successfully" Feb 9 19:28:39.023072 env[1144]: time="2024-02-09T19:28:39.023021343Z" level=info msg="StopPodSandbox for \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\"" Feb 9 19:28:39.212434 env[1144]: 2024-02-09 19:28:39.149 [INFO][3738] k8s.go 578: Cleaning up netns ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Feb 9 19:28:39.212434 env[1144]: 2024-02-09 19:28:39.149 [INFO][3738] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" iface="eth0" netns="/var/run/netns/cni-05cb593f-de80-dd48-a479-19223aa93e48" Feb 9 19:28:39.212434 env[1144]: 2024-02-09 19:28:39.149 [INFO][3738] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" iface="eth0" netns="/var/run/netns/cni-05cb593f-de80-dd48-a479-19223aa93e48" Feb 9 19:28:39.212434 env[1144]: 2024-02-09 19:28:39.149 [INFO][3738] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" iface="eth0" netns="/var/run/netns/cni-05cb593f-de80-dd48-a479-19223aa93e48" Feb 9 19:28:39.212434 env[1144]: 2024-02-09 19:28:39.149 [INFO][3738] k8s.go 585: Releasing IP address(es) ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Feb 9 19:28:39.212434 env[1144]: 2024-02-09 19:28:39.149 [INFO][3738] utils.go 188: Calico CNI releasing IP address ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Feb 9 19:28:39.212434 env[1144]: 2024-02-09 19:28:39.196 [INFO][3744] ipam_plugin.go 415: Releasing address using handleID ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" HandleID="k8s-pod-network.0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" Feb 9 19:28:39.212434 env[1144]: 2024-02-09 19:28:39.196 [INFO][3744] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:28:39.212434 env[1144]: 2024-02-09 19:28:39.196 [INFO][3744] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:28:39.212434 env[1144]: 2024-02-09 19:28:39.206 [WARNING][3744] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" HandleID="k8s-pod-network.0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" Feb 9 19:28:39.212434 env[1144]: 2024-02-09 19:28:39.207 [INFO][3744] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" HandleID="k8s-pod-network.0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" Feb 9 19:28:39.212434 env[1144]: 2024-02-09 19:28:39.209 [INFO][3744] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:28:39.212434 env[1144]: 2024-02-09 19:28:39.210 [INFO][3738] k8s.go 591: Teardown processing complete. ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Feb 9 19:28:39.217374 systemd[1]: run-netns-cni\x2d05cb593f\x2dde80\x2ddd48\x2da479\x2d19223aa93e48.mount: Deactivated successfully. Feb 9 19:28:39.218527 env[1144]: time="2024-02-09T19:28:39.218451817Z" level=info msg="TearDown network for sandbox \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\" successfully" Feb 9 19:28:39.218878 env[1144]: time="2024-02-09T19:28:39.218843934Z" level=info msg="StopPodSandbox for \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\" returns successfully" Feb 9 19:28:39.219885 env[1144]: time="2024-02-09T19:28:39.219846047Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-2v4px,Uid:c9c6a162-5805-4458-8fcc-6dcfaac58dfc,Namespace:kube-system,Attempt:1,}" Feb 9 19:28:39.464356 systemd-networkd[1027]: calia23302b4de3: Link UP Feb 9 19:28:39.479966 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:28:39.480086 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia23302b4de3: link becomes ready Feb 9 19:28:39.481073 systemd-networkd[1027]: calia23302b4de3: Gained carrier Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.337 [INFO][3750] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0 coredns-5dd5756b68- kube-system c9c6a162-5805-4458-8fcc-6dcfaac58dfc 748 0 2024-02-09 19:28:04 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal coredns-5dd5756b68-2v4px eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia23302b4de3 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" Namespace="kube-system" Pod="coredns-5dd5756b68-2v4px" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-" Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.338 [INFO][3750] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" Namespace="kube-system" Pod="coredns-5dd5756b68-2v4px" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.391 [INFO][3761] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" HandleID="k8s-pod-network.92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.407 [INFO][3761] ipam_plugin.go 268: Auto assigning IP ContainerID="92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" HandleID="k8s-pod-network.92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000501a80), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", "pod":"coredns-5dd5756b68-2v4px", "timestamp":"2024-02-09 19:28:39.391812539 +0000 UTC"}, Hostname:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.407 [INFO][3761] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.407 [INFO][3761] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.407 [INFO][3761] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal' Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.409 [INFO][3761] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.415 [INFO][3761] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.421 [INFO][3761] ipam.go 489: Trying affinity for 192.168.110.128/26 host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.423 [INFO][3761] ipam.go 155: Attempting to load block cidr=192.168.110.128/26 host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.427 [INFO][3761] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.128/26 host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.427 [INFO][3761] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.128/26 handle="k8s-pod-network.92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.429 [INFO][3761] ipam.go 1682: Creating new handle: k8s-pod-network.92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646 Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.442 [INFO][3761] ipam.go 1203: Writing block in order to claim IPs block=192.168.110.128/26 handle="k8s-pod-network.92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.451 [INFO][3761] ipam.go 1216: Successfully claimed IPs: [192.168.110.132/26] block=192.168.110.128/26 handle="k8s-pod-network.92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.451 [INFO][3761] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.132/26] handle="k8s-pod-network.92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.451 [INFO][3761] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:28:39.508874 env[1144]: 2024-02-09 19:28:39.452 [INFO][3761] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.110.132/26] IPv6=[] ContainerID="92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" HandleID="k8s-pod-network.92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" Feb 9 19:28:39.510126 env[1144]: 2024-02-09 19:28:39.453 [INFO][3750] k8s.go 385: Populated endpoint ContainerID="92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" Namespace="kube-system" Pod="coredns-5dd5756b68-2v4px" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"c9c6a162-5805-4458-8fcc-6dcfaac58dfc", ResourceVersion:"748", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-5dd5756b68-2v4px", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia23302b4de3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:28:39.510126 env[1144]: 2024-02-09 19:28:39.454 [INFO][3750] k8s.go 386: Calico CNI using IPs: [192.168.110.132/32] ContainerID="92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" Namespace="kube-system" Pod="coredns-5dd5756b68-2v4px" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" Feb 9 19:28:39.510126 env[1144]: 2024-02-09 19:28:39.454 [INFO][3750] dataplane_linux.go 68: Setting the host side veth name to calia23302b4de3 ContainerID="92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" Namespace="kube-system" Pod="coredns-5dd5756b68-2v4px" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" Feb 9 19:28:39.510126 env[1144]: 2024-02-09 19:28:39.484 [INFO][3750] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" Namespace="kube-system" Pod="coredns-5dd5756b68-2v4px" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" Feb 9 19:28:39.510126 env[1144]: 2024-02-09 19:28:39.484 [INFO][3750] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" Namespace="kube-system" Pod="coredns-5dd5756b68-2v4px" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"c9c6a162-5805-4458-8fcc-6dcfaac58dfc", ResourceVersion:"748", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646", Pod:"coredns-5dd5756b68-2v4px", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia23302b4de3", MAC:"3e:3f:66:d3:62:c3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:28:39.510126 env[1144]: 2024-02-09 19:28:39.504 [INFO][3750] k8s.go 491: Wrote updated endpoint to datastore ContainerID="92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646" Namespace="kube-system" Pod="coredns-5dd5756b68-2v4px" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" Feb 9 19:28:39.537000 audit[3778]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=3778 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:28:39.544152 kernel: kauditd_printk_skb: 282 callbacks suppressed Feb 9 19:28:39.544296 kernel: audit: type=1325 audit(1707506919.537:1296): table=filter:108 family=2 entries=38 op=nft_register_chain pid=3778 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:28:39.537000 audit[3778]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7fff8417cd10 a2=0 a3=7fff8417ccfc items=0 ppid=3154 pid=3778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:39.595329 kernel: audit: type=1300 audit(1707506919.537:1296): arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7fff8417cd10 a2=0 a3=7fff8417ccfc items=0 ppid=3154 pid=3778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:39.537000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:28:39.615197 kernel: audit: type=1327 audit(1707506919.537:1296): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:28:39.639536 env[1144]: time="2024-02-09T19:28:39.639443067Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:28:39.640374 env[1144]: time="2024-02-09T19:28:39.640302191Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:28:39.640517 env[1144]: time="2024-02-09T19:28:39.640372632Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:28:39.640714 env[1144]: time="2024-02-09T19:28:39.640661997Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646 pid=3788 runtime=io.containerd.runc.v2 Feb 9 19:28:39.671017 systemd[1]: Started cri-containerd-92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646.scope. Feb 9 19:28:39.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.728398 kernel: audit: type=1400 audit(1707506919.706:1297): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.749203 kernel: audit: type=1400 audit(1707506919.706:1298): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.783197 kernel: audit: type=1400 audit(1707506919.706:1299): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.830204 kernel: audit: type=1400 audit(1707506919.706:1300): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.867201 kernel: audit: type=1400 audit(1707506919.706:1301): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.905313 kernel: audit: type=1400 audit(1707506919.706:1302): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.753000 audit: BPF prog-id=174 op=LOAD Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3788 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:39.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932383530636234333063366538323538666631636536323164326235 Feb 9 19:28:39.927253 kernel: audit: type=1400 audit(1707506919.706:1303): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3788 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:39.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932383530636234333063366538323538666631636536323164326235 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit: BPF prog-id=175 op=LOAD Feb 9 19:28:39.754000 audit[3798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000296340 items=0 ppid=3788 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:39.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932383530636234333063366538323538666631636536323164326235 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit: BPF prog-id=176 op=LOAD Feb 9 19:28:39.754000 audit[3798]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000296388 items=0 ppid=3788 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:39.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932383530636234333063366538323538666631636536323164326235 Feb 9 19:28:39.754000 audit: BPF prog-id=176 op=UNLOAD Feb 9 19:28:39.754000 audit: BPF prog-id=175 op=UNLOAD Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { perfmon } for pid=3798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit[3798]: AVC avc: denied { bpf } for pid=3798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:39.754000 audit: BPF prog-id=177 op=LOAD Feb 9 19:28:39.754000 audit[3798]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000296798 items=0 ppid=3788 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:39.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932383530636234333063366538323538666631636536323164326235 Feb 9 19:28:39.940199 env[1144]: time="2024-02-09T19:28:39.940132700Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-2v4px,Uid:c9c6a162-5805-4458-8fcc-6dcfaac58dfc,Namespace:kube-system,Attempt:1,} returns sandbox id \"92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646\"" Feb 9 19:28:39.949338 env[1144]: time="2024-02-09T19:28:39.949290139Z" level=info msg="CreateContainer within sandbox \"92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:28:39.992206 env[1144]: time="2024-02-09T19:28:39.990102143Z" level=info msg="CreateContainer within sandbox \"92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"0160b66fac1634dbc2789e05d1dc965b8931c476f16ffb71eaa0fe6aae483be1\"" Feb 9 19:28:39.992640 env[1144]: time="2024-02-09T19:28:39.992602366Z" level=info msg="StartContainer for \"0160b66fac1634dbc2789e05d1dc965b8931c476f16ffb71eaa0fe6aae483be1\"" Feb 9 19:28:40.075526 systemd[1]: Started cri-containerd-0160b66fac1634dbc2789e05d1dc965b8931c476f16ffb71eaa0fe6aae483be1.scope. Feb 9 19:28:40.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.145000 audit: BPF prog-id=178 op=LOAD Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3788 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:40.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031363062363666616331363334646263323738396530356431646339 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3788 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:40.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031363062363666616331363334646263323738396530356431646339 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit: BPF prog-id=179 op=LOAD Feb 9 19:28:40.146000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025b60 items=0 ppid=3788 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:40.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031363062363666616331363334646263323738396530356431646339 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit: BPF prog-id=180 op=LOAD Feb 9 19:28:40.146000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025ba8 items=0 ppid=3788 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:40.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031363062363666616331363334646263323738396530356431646339 Feb 9 19:28:40.146000 audit: BPF prog-id=180 op=UNLOAD Feb 9 19:28:40.146000 audit: BPF prog-id=179 op=UNLOAD Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.146000 audit: BPF prog-id=181 op=LOAD Feb 9 19:28:40.146000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025fb8 items=0 ppid=3788 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:40.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031363062363666616331363334646263323738396530356431646339 Feb 9 19:28:40.204021 env[1144]: time="2024-02-09T19:28:40.203948608Z" level=info msg="StartContainer for \"0160b66fac1634dbc2789e05d1dc965b8931c476f16ffb71eaa0fe6aae483be1\" returns successfully" Feb 9 19:28:40.388912 kubelet[2075]: I0209 19:28:40.388778 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-2v4px" podStartSLOduration=36.388706168 podCreationTimestamp="2024-02-09 19:28:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:28:40.387316002 +0000 UTC m=+50.635402808" watchObservedRunningTime="2024-02-09 19:28:40.388706168 +0000 UTC m=+50.636792972" Feb 9 19:28:40.432000 audit[3865]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=3865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:40.432000 audit[3865]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe37429d60 a2=0 a3=7ffe37429d4c items=0 ppid=2259 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:40.432000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:40.450000 audit[3865]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=3865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:40.450000 audit[3865]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffe37429d60 a2=0 a3=7ffe37429d4c items=0 ppid=2259 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:40.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:40.512525 env[1144]: time="2024-02-09T19:28:40.512464654Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:40.515271 env[1144]: time="2024-02-09T19:28:40.515222053Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:40.520204 env[1144]: time="2024-02-09T19:28:40.519541104Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:40.521951 env[1144]: time="2024-02-09T19:28:40.521911167Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:40.523387 env[1144]: time="2024-02-09T19:28:40.523345026Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 9 19:28:40.527037 env[1144]: time="2024-02-09T19:28:40.526980706Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:28:40.551520 env[1144]: time="2024-02-09T19:28:40.551458325Z" level=info msg="CreateContainer within sandbox \"f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 19:28:40.572439 env[1144]: time="2024-02-09T19:28:40.572369816Z" level=info msg="CreateContainer within sandbox \"f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"42dbad43519b9b87124343f3bf1302a3c85b9d147bdd3542dd18e890a3705105\"" Feb 9 19:28:40.573219 env[1144]: time="2024-02-09T19:28:40.573159319Z" level=info msg="StartContainer for \"42dbad43519b9b87124343f3bf1302a3c85b9d147bdd3542dd18e890a3705105\"" Feb 9 19:28:40.615014 systemd[1]: Started cri-containerd-42dbad43519b9b87124343f3bf1302a3c85b9d147bdd3542dd18e890a3705105.scope. Feb 9 19:28:40.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.645000 audit: BPF prog-id=182 op=LOAD Feb 9 19:28:40.647000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.647000 audit[3877]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3590 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:40.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432646261643433353139623962383731323433343366336266313330 Feb 9 19:28:40.647000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.647000 audit[3877]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3590 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:40.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432646261643433353139623962383731323433343366336266313330 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit: BPF prog-id=183 op=LOAD Feb 9 19:28:40.648000 audit[3877]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003178d0 items=0 ppid=3590 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:40.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432646261643433353139623962383731323433343366336266313330 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit: BPF prog-id=184 op=LOAD Feb 9 19:28:40.648000 audit[3877]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000317918 items=0 ppid=3590 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:40.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432646261643433353139623962383731323433343366336266313330 Feb 9 19:28:40.648000 audit: BPF prog-id=184 op=UNLOAD Feb 9 19:28:40.648000 audit: BPF prog-id=183 op=UNLOAD Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:40.648000 audit: BPF prog-id=185 op=LOAD Feb 9 19:28:40.648000 audit[3877]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000317d28 items=0 ppid=3590 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:40.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432646261643433353139623962383731323433343366336266313330 Feb 9 19:28:40.704102 env[1144]: time="2024-02-09T19:28:40.704045151Z" level=info msg="StartContainer for \"42dbad43519b9b87124343f3bf1302a3c85b9d147bdd3542dd18e890a3705105\" returns successfully" Feb 9 19:28:40.932049 systemd-networkd[1027]: calia23302b4de3: Gained IPv6LL Feb 9 19:28:41.378801 kubelet[2075]: I0209 19:28:41.378579 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-78f6994685-27ng5" podStartSLOduration=27.671897825 podCreationTimestamp="2024-02-09 19:28:09 +0000 UTC" firstStartedPulling="2024-02-09 19:28:35.817231887 +0000 UTC m=+46.065318677" lastFinishedPulling="2024-02-09 19:28:40.523840459 +0000 UTC m=+50.771927259" observedRunningTime="2024-02-09 19:28:41.37469057 +0000 UTC m=+51.622777383" watchObservedRunningTime="2024-02-09 19:28:41.378506407 +0000 UTC m=+51.626593214" Feb 9 19:28:41.399771 systemd[1]: run-containerd-runc-k8s.io-42dbad43519b9b87124343f3bf1302a3c85b9d147bdd3542dd18e890a3705105-runc.Sdngkm.mount: Deactivated successfully. Feb 9 19:28:41.468000 audit[3921]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=3921 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:41.468000 audit[3921]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe6e4191c0 a2=0 a3=7ffe6e4191ac items=0 ppid=2259 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:41.468000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:41.482000 audit[3921]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=3921 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:28:41.482000 audit[3921]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffe6e4191c0 a2=0 a3=7ffe6e4191ac items=0 ppid=2259 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:41.482000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:28:42.107797 env[1144]: time="2024-02-09T19:28:42.107745832Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:42.110566 env[1144]: time="2024-02-09T19:28:42.110522762Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:42.113041 env[1144]: time="2024-02-09T19:28:42.113004707Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:42.115010 env[1144]: time="2024-02-09T19:28:42.114972927Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:28:42.115998 env[1144]: time="2024-02-09T19:28:42.115955343Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 19:28:42.119348 env[1144]: time="2024-02-09T19:28:42.119311852Z" level=info msg="CreateContainer within sandbox \"93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:28:42.145363 env[1144]: time="2024-02-09T19:28:42.145295616Z" level=info msg="CreateContainer within sandbox \"93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"24247cd6fc7249330807558eac13074bcf536677b7e65a1a3bacb2fb0b4c2d9f\"" Feb 9 19:28:42.146582 env[1144]: time="2024-02-09T19:28:42.146543835Z" level=info msg="StartContainer for \"24247cd6fc7249330807558eac13074bcf536677b7e65a1a3bacb2fb0b4c2d9f\"" Feb 9 19:28:42.192153 systemd[1]: Started cri-containerd-24247cd6fc7249330807558eac13074bcf536677b7e65a1a3bacb2fb0b4c2d9f.scope. Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3629 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:42.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234323437636436666337323439333330383037353538656163313330 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit: BPF prog-id=186 op=LOAD Feb 9 19:28:42.234000 audit[3939]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002d7bc0 items=0 ppid=3629 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:42.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234323437636436666337323439333330383037353538656163313330 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit: BPF prog-id=187 op=LOAD Feb 9 19:28:42.234000 audit[3939]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002d7c08 items=0 ppid=3629 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:42.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234323437636436666337323439333330383037353538656163313330 Feb 9 19:28:42.234000 audit: BPF prog-id=187 op=UNLOAD Feb 9 19:28:42.234000 audit: BPF prog-id=186 op=UNLOAD Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:28:42.234000 audit: BPF prog-id=188 op=LOAD Feb 9 19:28:42.234000 audit[3939]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002d7c98 items=0 ppid=3629 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:42.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234323437636436666337323439333330383037353538656163313330 Feb 9 19:28:42.269468 env[1144]: time="2024-02-09T19:28:42.269410222Z" level=info msg="StartContainer for \"24247cd6fc7249330807558eac13074bcf536677b7e65a1a3bacb2fb0b4c2d9f\" returns successfully" Feb 9 19:28:43.193259 kubelet[2075]: I0209 19:28:43.193209 2075 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:28:43.193259 kubelet[2075]: I0209 19:28:43.193265 2075 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:28:46.408000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:28:46.415849 kernel: kauditd_printk_skb: 219 callbacks suppressed Feb 9 19:28:46.416018 kernel: audit: type=1400 audit(1707506926.408:1361): avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:28:46.408000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021c1560 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:28:46.476927 kernel: audit: type=1300 audit(1707506926.408:1361): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021c1560 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:28:46.477126 kernel: audit: type=1327 audit(1707506926.408:1361): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:28:46.408000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:28:46.409000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:28:46.531612 kernel: audit: type=1400 audit(1707506926.409:1362): avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:28:46.409000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e70640 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:28:46.566260 kernel: audit: type=1300 audit(1707506926.409:1362): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e70640 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:28:46.566437 kernel: audit: type=1327 audit(1707506926.409:1362): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:28:46.409000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:28:46.527000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:28:46.621796 kernel: audit: type=1400 audit(1707506926.527:1363): avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:28:46.621958 kernel: audit: type=1300 audit(1707506926.527:1363): arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c012734150 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:28:46.527000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c012734150 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:28:46.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:28:46.656209 kernel: audit: type=1327 audit(1707506926.527:1363): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:28:46.528000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:28:46.710300 kernel: audit: type=1400 audit(1707506926.528:1364): avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:28:46.528000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00f566c40 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:28:46.528000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:28:46.532000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:28:46.532000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0127341e0 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:28:46.532000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:28:46.571000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:28:46.571000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c012321080 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:28:46.571000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:28:46.576000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:28:46.576000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c012734300 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:28:46.576000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:28:46.577000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:28:46.577000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00f5ff9c0 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:28:46.577000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:28:49.971295 env[1144]: time="2024-02-09T19:28:49.971226224Z" level=info msg="StopPodSandbox for \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\"" Feb 9 19:28:50.065437 env[1144]: 2024-02-09 19:28:50.025 [WARNING][3989] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"c9c6a162-5805-4458-8fcc-6dcfaac58dfc", ResourceVersion:"774", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646", Pod:"coredns-5dd5756b68-2v4px", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia23302b4de3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:28:50.065437 env[1144]: 2024-02-09 19:28:50.026 [INFO][3989] k8s.go 578: Cleaning up netns ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Feb 9 19:28:50.065437 env[1144]: 2024-02-09 19:28:50.026 [INFO][3989] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" iface="eth0" netns="" Feb 9 19:28:50.065437 env[1144]: 2024-02-09 19:28:50.026 [INFO][3989] k8s.go 585: Releasing IP address(es) ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Feb 9 19:28:50.065437 env[1144]: 2024-02-09 19:28:50.026 [INFO][3989] utils.go 188: Calico CNI releasing IP address ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Feb 9 19:28:50.065437 env[1144]: 2024-02-09 19:28:50.053 [INFO][3995] ipam_plugin.go 415: Releasing address using handleID ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" HandleID="k8s-pod-network.0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" Feb 9 19:28:50.065437 env[1144]: 2024-02-09 19:28:50.053 [INFO][3995] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:28:50.065437 env[1144]: 2024-02-09 19:28:50.053 [INFO][3995] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:28:50.065437 env[1144]: 2024-02-09 19:28:50.061 [WARNING][3995] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" HandleID="k8s-pod-network.0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" Feb 9 19:28:50.065437 env[1144]: 2024-02-09 19:28:50.061 [INFO][3995] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" HandleID="k8s-pod-network.0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" Feb 9 19:28:50.065437 env[1144]: 2024-02-09 19:28:50.063 [INFO][3995] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:28:50.065437 env[1144]: 2024-02-09 19:28:50.064 [INFO][3989] k8s.go 591: Teardown processing complete. ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Feb 9 19:28:50.066335 env[1144]: time="2024-02-09T19:28:50.065460853Z" level=info msg="TearDown network for sandbox \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\" successfully" Feb 9 19:28:50.066335 env[1144]: time="2024-02-09T19:28:50.065504973Z" level=info msg="StopPodSandbox for \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\" returns successfully" Feb 9 19:28:50.066479 env[1144]: time="2024-02-09T19:28:50.066338498Z" level=info msg="RemovePodSandbox for \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\"" Feb 9 19:28:50.066479 env[1144]: time="2024-02-09T19:28:50.066381868Z" level=info msg="Forcibly stopping sandbox \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\"" Feb 9 19:28:50.161849 env[1144]: 2024-02-09 19:28:50.119 [WARNING][4016] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"c9c6a162-5805-4458-8fcc-6dcfaac58dfc", ResourceVersion:"774", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"92850cb430c6e8258ff1ce621d2b54c52a1283bcf031107f3de5dc70d4b68646", Pod:"coredns-5dd5756b68-2v4px", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia23302b4de3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:28:50.161849 env[1144]: 2024-02-09 19:28:50.119 [INFO][4016] k8s.go 578: Cleaning up netns ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Feb 9 19:28:50.161849 env[1144]: 2024-02-09 19:28:50.119 [INFO][4016] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" iface="eth0" netns="" Feb 9 19:28:50.161849 env[1144]: 2024-02-09 19:28:50.119 [INFO][4016] k8s.go 585: Releasing IP address(es) ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Feb 9 19:28:50.161849 env[1144]: 2024-02-09 19:28:50.119 [INFO][4016] utils.go 188: Calico CNI releasing IP address ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Feb 9 19:28:50.161849 env[1144]: 2024-02-09 19:28:50.149 [INFO][4023] ipam_plugin.go 415: Releasing address using handleID ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" HandleID="k8s-pod-network.0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" Feb 9 19:28:50.161849 env[1144]: 2024-02-09 19:28:50.149 [INFO][4023] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:28:50.161849 env[1144]: 2024-02-09 19:28:50.149 [INFO][4023] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:28:50.161849 env[1144]: 2024-02-09 19:28:50.157 [WARNING][4023] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" HandleID="k8s-pod-network.0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" Feb 9 19:28:50.161849 env[1144]: 2024-02-09 19:28:50.157 [INFO][4023] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" HandleID="k8s-pod-network.0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--2v4px-eth0" Feb 9 19:28:50.161849 env[1144]: 2024-02-09 19:28:50.159 [INFO][4023] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:28:50.161849 env[1144]: 2024-02-09 19:28:50.160 [INFO][4016] k8s.go 591: Teardown processing complete. ContainerID="0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f" Feb 9 19:28:50.162908 env[1144]: time="2024-02-09T19:28:50.162834791Z" level=info msg="TearDown network for sandbox \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\" successfully" Feb 9 19:28:50.170115 env[1144]: time="2024-02-09T19:28:50.169360427Z" level=info msg="RemovePodSandbox \"0f6fa8fea2d389efd5f2cfa79ba3d25247c8300dca406c4e3868205ce73fae2f\" returns successfully" Feb 9 19:28:50.171000 env[1144]: time="2024-02-09T19:28:50.170930615Z" level=info msg="StopPodSandbox for \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\"" Feb 9 19:28:50.271273 env[1144]: 2024-02-09 19:28:50.226 [WARNING][4043] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"95aa7307-05b7-4ac7-88c4-c4683637bf1d", ResourceVersion:"720", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf", Pod:"coredns-5dd5756b68-bm2j6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali236d0914978", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:28:50.271273 env[1144]: 2024-02-09 19:28:50.227 [INFO][4043] k8s.go 578: Cleaning up netns ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Feb 9 19:28:50.271273 env[1144]: 2024-02-09 19:28:50.227 [INFO][4043] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" iface="eth0" netns="" Feb 9 19:28:50.271273 env[1144]: 2024-02-09 19:28:50.227 [INFO][4043] k8s.go 585: Releasing IP address(es) ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Feb 9 19:28:50.271273 env[1144]: 2024-02-09 19:28:50.227 [INFO][4043] utils.go 188: Calico CNI releasing IP address ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Feb 9 19:28:50.271273 env[1144]: 2024-02-09 19:28:50.257 [INFO][4049] ipam_plugin.go 415: Releasing address using handleID ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" HandleID="k8s-pod-network.3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" Feb 9 19:28:50.271273 env[1144]: 2024-02-09 19:28:50.257 [INFO][4049] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:28:50.271273 env[1144]: 2024-02-09 19:28:50.257 [INFO][4049] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:28:50.271273 env[1144]: 2024-02-09 19:28:50.265 [WARNING][4049] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" HandleID="k8s-pod-network.3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" Feb 9 19:28:50.271273 env[1144]: 2024-02-09 19:28:50.265 [INFO][4049] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" HandleID="k8s-pod-network.3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" Feb 9 19:28:50.271273 env[1144]: 2024-02-09 19:28:50.268 [INFO][4049] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:28:50.271273 env[1144]: 2024-02-09 19:28:50.269 [INFO][4043] k8s.go 591: Teardown processing complete. ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Feb 9 19:28:50.273773 env[1144]: time="2024-02-09T19:28:50.271233189Z" level=info msg="TearDown network for sandbox \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\" successfully" Feb 9 19:28:50.273939 env[1144]: time="2024-02-09T19:28:50.273777678Z" level=info msg="StopPodSandbox for \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\" returns successfully" Feb 9 19:28:50.274688 env[1144]: time="2024-02-09T19:28:50.274643436Z" level=info msg="RemovePodSandbox for \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\"" Feb 9 19:28:50.274843 env[1144]: time="2024-02-09T19:28:50.274693751Z" level=info msg="Forcibly stopping sandbox \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\"" Feb 9 19:28:50.403845 env[1144]: 2024-02-09 19:28:50.335 [WARNING][4067] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"95aa7307-05b7-4ac7-88c4-c4683637bf1d", ResourceVersion:"720", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"d922372520a597c17b1b7327535a1db1abb3ecabcf5fad6aafd2b2e8f5c84eaf", Pod:"coredns-5dd5756b68-bm2j6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali236d0914978", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:28:50.403845 env[1144]: 2024-02-09 19:28:50.336 [INFO][4067] k8s.go 578: Cleaning up netns ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Feb 9 19:28:50.403845 env[1144]: 2024-02-09 19:28:50.336 [INFO][4067] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" iface="eth0" netns="" Feb 9 19:28:50.403845 env[1144]: 2024-02-09 19:28:50.336 [INFO][4067] k8s.go 585: Releasing IP address(es) ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Feb 9 19:28:50.403845 env[1144]: 2024-02-09 19:28:50.336 [INFO][4067] utils.go 188: Calico CNI releasing IP address ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Feb 9 19:28:50.403845 env[1144]: 2024-02-09 19:28:50.389 [INFO][4074] ipam_plugin.go 415: Releasing address using handleID ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" HandleID="k8s-pod-network.3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" Feb 9 19:28:50.403845 env[1144]: 2024-02-09 19:28:50.390 [INFO][4074] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:28:50.403845 env[1144]: 2024-02-09 19:28:50.390 [INFO][4074] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:28:50.403845 env[1144]: 2024-02-09 19:28:50.399 [WARNING][4074] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" HandleID="k8s-pod-network.3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" Feb 9 19:28:50.403845 env[1144]: 2024-02-09 19:28:50.399 [INFO][4074] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" HandleID="k8s-pod-network.3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--bm2j6-eth0" Feb 9 19:28:50.403845 env[1144]: 2024-02-09 19:28:50.401 [INFO][4074] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:28:50.403845 env[1144]: 2024-02-09 19:28:50.402 [INFO][4067] k8s.go 591: Teardown processing complete. ContainerID="3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4" Feb 9 19:28:50.404756 env[1144]: time="2024-02-09T19:28:50.403874108Z" level=info msg="TearDown network for sandbox \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\" successfully" Feb 9 19:28:50.409425 env[1144]: time="2024-02-09T19:28:50.409371447Z" level=info msg="RemovePodSandbox \"3de0babf13ed46d606d4471bbf88a150b4e9f09bae9f56e1fb2fb6f95454a1c4\" returns successfully" Feb 9 19:28:50.410201 env[1144]: time="2024-02-09T19:28:50.410110114Z" level=info msg="StopPodSandbox for \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\"" Feb 9 19:28:50.502903 env[1144]: 2024-02-09 19:28:50.455 [WARNING][4095] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f36f0162-fc14-49d3-a469-649f26287da4", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd", Pod:"csi-node-driver-qxx4b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali62089dc7e5d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:28:50.502903 env[1144]: 2024-02-09 19:28:50.455 [INFO][4095] k8s.go 578: Cleaning up netns ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Feb 9 19:28:50.502903 env[1144]: 2024-02-09 19:28:50.456 [INFO][4095] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" iface="eth0" netns="" Feb 9 19:28:50.502903 env[1144]: 2024-02-09 19:28:50.456 [INFO][4095] k8s.go 585: Releasing IP address(es) ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Feb 9 19:28:50.502903 env[1144]: 2024-02-09 19:28:50.456 [INFO][4095] utils.go 188: Calico CNI releasing IP address ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Feb 9 19:28:50.502903 env[1144]: 2024-02-09 19:28:50.489 [INFO][4102] ipam_plugin.go 415: Releasing address using handleID ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" HandleID="k8s-pod-network.b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" Feb 9 19:28:50.502903 env[1144]: 2024-02-09 19:28:50.489 [INFO][4102] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:28:50.502903 env[1144]: 2024-02-09 19:28:50.489 [INFO][4102] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:28:50.502903 env[1144]: 2024-02-09 19:28:50.497 [WARNING][4102] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" HandleID="k8s-pod-network.b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" Feb 9 19:28:50.502903 env[1144]: 2024-02-09 19:28:50.497 [INFO][4102] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" HandleID="k8s-pod-network.b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" Feb 9 19:28:50.502903 env[1144]: 2024-02-09 19:28:50.500 [INFO][4102] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:28:50.502903 env[1144]: 2024-02-09 19:28:50.501 [INFO][4095] k8s.go 591: Teardown processing complete. ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Feb 9 19:28:50.503835 env[1144]: time="2024-02-09T19:28:50.502951249Z" level=info msg="TearDown network for sandbox \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\" successfully" Feb 9 19:28:50.503835 env[1144]: time="2024-02-09T19:28:50.503000720Z" level=info msg="StopPodSandbox for \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\" returns successfully" Feb 9 19:28:50.504191 env[1144]: time="2024-02-09T19:28:50.504139082Z" level=info msg="RemovePodSandbox for \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\"" Feb 9 19:28:50.504461 env[1144]: time="2024-02-09T19:28:50.504380049Z" level=info msg="Forcibly stopping sandbox \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\"" Feb 9 19:28:50.529000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:28:50.529000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fc46e0 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:28:50.529000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:28:50.532000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:28:50.532000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e70f40 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:28:50.532000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:28:50.535000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:28:50.535000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fc4940 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:28:50.535000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:28:50.536000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:28:50.536000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e710e0 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:28:50.536000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:28:50.592617 env[1144]: 2024-02-09 19:28:50.553 [WARNING][4121] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f36f0162-fc14-49d3-a469-649f26287da4", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"93d6ac3a5fc918874eb190f34d9d857b53130715488acc595c6649eb074843bd", Pod:"csi-node-driver-qxx4b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali62089dc7e5d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:28:50.592617 env[1144]: 2024-02-09 19:28:50.553 [INFO][4121] k8s.go 578: Cleaning up netns ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Feb 9 19:28:50.592617 env[1144]: 2024-02-09 19:28:50.553 [INFO][4121] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" iface="eth0" netns="" Feb 9 19:28:50.592617 env[1144]: 2024-02-09 19:28:50.553 [INFO][4121] k8s.go 585: Releasing IP address(es) ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Feb 9 19:28:50.592617 env[1144]: 2024-02-09 19:28:50.553 [INFO][4121] utils.go 188: Calico CNI releasing IP address ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Feb 9 19:28:50.592617 env[1144]: 2024-02-09 19:28:50.580 [INFO][4127] ipam_plugin.go 415: Releasing address using handleID ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" HandleID="k8s-pod-network.b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" Feb 9 19:28:50.592617 env[1144]: 2024-02-09 19:28:50.580 [INFO][4127] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:28:50.592617 env[1144]: 2024-02-09 19:28:50.580 [INFO][4127] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:28:50.592617 env[1144]: 2024-02-09 19:28:50.588 [WARNING][4127] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" HandleID="k8s-pod-network.b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" Feb 9 19:28:50.592617 env[1144]: 2024-02-09 19:28:50.588 [INFO][4127] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" HandleID="k8s-pod-network.b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-csi--node--driver--qxx4b-eth0" Feb 9 19:28:50.592617 env[1144]: 2024-02-09 19:28:50.590 [INFO][4127] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:28:50.592617 env[1144]: 2024-02-09 19:28:50.591 [INFO][4121] k8s.go 591: Teardown processing complete. ContainerID="b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e" Feb 9 19:28:50.593703 env[1144]: time="2024-02-09T19:28:50.593640429Z" level=info msg="TearDown network for sandbox \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\" successfully" Feb 9 19:28:50.598838 env[1144]: time="2024-02-09T19:28:50.598780181Z" level=info msg="RemovePodSandbox \"b9571e21796ec45778786e20715a16302475eb0f8ba16e11f15818740883319e\" returns successfully" Feb 9 19:28:50.599516 env[1144]: time="2024-02-09T19:28:50.599464015Z" level=info msg="StopPodSandbox for \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\"" Feb 9 19:28:50.697486 env[1144]: 2024-02-09 19:28:50.653 [WARNING][4145] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0", GenerateName:"calico-kube-controllers-78f6994685-", Namespace:"calico-system", SelfLink:"", UID:"49da16b9-492a-4550-8608-77a4393c3ae3", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78f6994685", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb", Pod:"calico-kube-controllers-78f6994685-27ng5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliedc428fc7d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:28:50.697486 env[1144]: 2024-02-09 19:28:50.654 [INFO][4145] k8s.go 578: Cleaning up netns ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Feb 9 19:28:50.697486 env[1144]: 2024-02-09 19:28:50.654 [INFO][4145] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" iface="eth0" netns="" Feb 9 19:28:50.697486 env[1144]: 2024-02-09 19:28:50.654 [INFO][4145] k8s.go 585: Releasing IP address(es) ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Feb 9 19:28:50.697486 env[1144]: 2024-02-09 19:28:50.654 [INFO][4145] utils.go 188: Calico CNI releasing IP address ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Feb 9 19:28:50.697486 env[1144]: 2024-02-09 19:28:50.681 [INFO][4151] ipam_plugin.go 415: Releasing address using handleID ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" HandleID="k8s-pod-network.79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" Feb 9 19:28:50.697486 env[1144]: 2024-02-09 19:28:50.681 [INFO][4151] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:28:50.697486 env[1144]: 2024-02-09 19:28:50.681 [INFO][4151] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:28:50.697486 env[1144]: 2024-02-09 19:28:50.692 [WARNING][4151] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" HandleID="k8s-pod-network.79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" Feb 9 19:28:50.697486 env[1144]: 2024-02-09 19:28:50.692 [INFO][4151] ipam_plugin.go 443: Releasing address using workloadID ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" HandleID="k8s-pod-network.79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" Feb 9 19:28:50.697486 env[1144]: 2024-02-09 19:28:50.694 [INFO][4151] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:28:50.697486 env[1144]: 2024-02-09 19:28:50.695 [INFO][4145] k8s.go 591: Teardown processing complete. ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Feb 9 19:28:50.698600 env[1144]: time="2024-02-09T19:28:50.698535054Z" level=info msg="TearDown network for sandbox \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\" successfully" Feb 9 19:28:50.698600 env[1144]: time="2024-02-09T19:28:50.698596830Z" level=info msg="StopPodSandbox for \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\" returns successfully" Feb 9 19:28:50.699314 env[1144]: time="2024-02-09T19:28:50.699277274Z" level=info msg="RemovePodSandbox for \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\"" Feb 9 19:28:50.699532 env[1144]: time="2024-02-09T19:28:50.699459197Z" level=info msg="Forcibly stopping sandbox \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\"" Feb 9 19:28:50.810063 env[1144]: 2024-02-09 19:28:50.743 [WARNING][4171] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0", GenerateName:"calico-kube-controllers-78f6994685-", Namespace:"calico-system", SelfLink:"", UID:"49da16b9-492a-4550-8608-77a4393c3ae3", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 28, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78f6994685", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"f133c431b5d38a2f7ab6bdf6ec4e5d803e7d9026efd756af4ddeb90ad92ea1cb", Pod:"calico-kube-controllers-78f6994685-27ng5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliedc428fc7d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:28:50.810063 env[1144]: 2024-02-09 19:28:50.744 [INFO][4171] k8s.go 578: Cleaning up netns ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Feb 9 19:28:50.810063 env[1144]: 2024-02-09 19:28:50.744 [INFO][4171] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" iface="eth0" netns="" Feb 9 19:28:50.810063 env[1144]: 2024-02-09 19:28:50.744 [INFO][4171] k8s.go 585: Releasing IP address(es) ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Feb 9 19:28:50.810063 env[1144]: 2024-02-09 19:28:50.744 [INFO][4171] utils.go 188: Calico CNI releasing IP address ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Feb 9 19:28:50.810063 env[1144]: 2024-02-09 19:28:50.768 [INFO][4177] ipam_plugin.go 415: Releasing address using handleID ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" HandleID="k8s-pod-network.79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" Feb 9 19:28:50.810063 env[1144]: 2024-02-09 19:28:50.768 [INFO][4177] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:28:50.810063 env[1144]: 2024-02-09 19:28:50.768 [INFO][4177] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:28:50.810063 env[1144]: 2024-02-09 19:28:50.790 [WARNING][4177] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" HandleID="k8s-pod-network.79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" Feb 9 19:28:50.810063 env[1144]: 2024-02-09 19:28:50.790 [INFO][4177] ipam_plugin.go 443: Releasing address using workloadID ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" HandleID="k8s-pod-network.79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--kube--controllers--78f6994685--27ng5-eth0" Feb 9 19:28:50.810063 env[1144]: 2024-02-09 19:28:50.806 [INFO][4177] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:28:50.810063 env[1144]: 2024-02-09 19:28:50.808 [INFO][4171] k8s.go 591: Teardown processing complete. ContainerID="79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370" Feb 9 19:28:50.810940 env[1144]: time="2024-02-09T19:28:50.810107945Z" level=info msg="TearDown network for sandbox \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\" successfully" Feb 9 19:28:50.815797 env[1144]: time="2024-02-09T19:28:50.815714831Z" level=info msg="RemovePodSandbox \"79cd0ecab53e29fb8260e89c834ed81f6c3320d273d765049017aa2da17e2370\" returns successfully" Feb 9 19:28:54.591405 systemd[1]: Started sshd@7-10.128.0.111:22-147.75.109.163:43390.service. Feb 9 19:28:54.623013 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 9 19:28:54.623259 kernel: audit: type=1130 audit(1707506934.590:1373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.111:22-147.75.109.163:43390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:28:54.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.111:22-147.75.109.163:43390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:28:54.880000 audit[4213]: USER_ACCT pid=4213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:28:54.912061 sshd[4213]: Accepted publickey for core from 147.75.109.163 port 43390 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:28:54.912559 kernel: audit: type=1101 audit(1707506934.880:1374): pid=4213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:28:54.912706 sshd[4213]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:28:54.910000 audit[4213]: CRED_ACQ pid=4213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:28:54.925977 systemd[1]: Started session-8.scope. Feb 9 19:28:54.928664 systemd-logind[1129]: New session 8 of user core. Feb 9 19:28:54.940805 kernel: audit: type=1103 audit(1707506934.910:1375): pid=4213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:28:54.961204 kernel: audit: type=1006 audit(1707506934.910:1376): pid=4213 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Feb 9 19:28:54.910000 audit[4213]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc81e6ddc0 a2=3 a3=0 items=0 ppid=1 pid=4213 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:54.995209 kernel: audit: type=1300 audit(1707506934.910:1376): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc81e6ddc0 a2=3 a3=0 items=0 ppid=1 pid=4213 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:28:54.995448 kernel: audit: type=1327 audit(1707506934.910:1376): proctitle=737368643A20636F7265205B707269765D Feb 9 19:28:54.910000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:28:54.933000 audit[4213]: USER_START pid=4213 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:28:55.042370 kernel: audit: type=1105 audit(1707506934.933:1377): pid=4213 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:28:55.042548 kernel: audit: type=1103 audit(1707506934.941:1378): pid=4215 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:28:54.941000 audit[4215]: CRED_ACQ pid=4215 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:28:55.219057 sshd[4213]: pam_unix(sshd:session): session closed for user core Feb 9 19:28:55.221000 audit[4213]: USER_END pid=4213 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:28:55.256290 kernel: audit: type=1106 audit(1707506935.221:1379): pid=4213 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:28:55.247000 audit[4213]: CRED_DISP pid=4213 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:28:55.273669 systemd[1]: sshd@7-10.128.0.111:22-147.75.109.163:43390.service: Deactivated successfully. Feb 9 19:28:55.274873 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 19:28:55.277141 systemd-logind[1129]: Session 8 logged out. Waiting for processes to exit. Feb 9 19:28:55.278806 systemd-logind[1129]: Removed session 8. Feb 9 19:28:55.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.111:22-147.75.109.163:43390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:28:55.285232 kernel: audit: type=1104 audit(1707506935.247:1380): pid=4213 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:28:55.355476 kubelet[2075]: I0209 19:28:55.355430 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-qxx4b" podStartSLOduration=40.03265234 podCreationTimestamp="2024-02-09 19:28:09 +0000 UTC" firstStartedPulling="2024-02-09 19:28:35.793710886 +0000 UTC m=+46.041797682" lastFinishedPulling="2024-02-09 19:28:42.11640493 +0000 UTC m=+52.364491730" observedRunningTime="2024-02-09 19:28:42.388976447 +0000 UTC m=+52.637063253" watchObservedRunningTime="2024-02-09 19:28:55.355346388 +0000 UTC m=+65.603433195" Feb 9 19:29:00.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.111:22-147.75.109.163:43394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:00.266391 systemd[1]: Started sshd@8-10.128.0.111:22-147.75.109.163:43394.service. Feb 9 19:29:00.272050 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:29:00.272167 kernel: audit: type=1130 audit(1707506940.265:1382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.111:22-147.75.109.163:43394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:00.557000 audit[4251]: USER_ACCT pid=4251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:00.558784 sshd[4251]: Accepted publickey for core from 147.75.109.163 port 43394 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:29:00.588208 kernel: audit: type=1101 audit(1707506940.557:1383): pid=4251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:00.587000 audit[4251]: CRED_ACQ pid=4251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:00.589647 sshd[4251]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:29:00.602152 systemd[1]: Started session-9.scope. Feb 9 19:29:00.604086 systemd-logind[1129]: New session 9 of user core. Feb 9 19:29:00.616361 kernel: audit: type=1103 audit(1707506940.587:1384): pid=4251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:00.616489 kernel: audit: type=1006 audit(1707506940.587:1385): pid=4251 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Feb 9 19:29:00.587000 audit[4251]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4fb444b0 a2=3 a3=0 items=0 ppid=1 pid=4251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:00.631250 kernel: audit: type=1300 audit(1707506940.587:1385): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4fb444b0 a2=3 a3=0 items=0 ppid=1 pid=4251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:00.659423 kernel: audit: type=1327 audit(1707506940.587:1385): proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:00.587000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:00.612000 audit[4251]: USER_START pid=4251 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:00.669209 kernel: audit: type=1105 audit(1707506940.612:1386): pid=4251 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:00.613000 audit[4253]: CRED_ACQ pid=4253 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:00.707209 kernel: audit: type=1103 audit(1707506940.613:1387): pid=4253 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:00.871953 sshd[4251]: pam_unix(sshd:session): session closed for user core Feb 9 19:29:00.874000 audit[4251]: USER_END pid=4251 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:00.881773 systemd[1]: sshd@8-10.128.0.111:22-147.75.109.163:43394.service: Deactivated successfully. Feb 9 19:29:00.883093 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 19:29:00.885264 systemd-logind[1129]: Session 9 logged out. Waiting for processes to exit. Feb 9 19:29:00.887065 systemd-logind[1129]: Removed session 9. Feb 9 19:29:00.908492 kernel: audit: type=1106 audit(1707506940.874:1388): pid=4251 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:00.908634 kernel: audit: type=1104 audit(1707506940.874:1389): pid=4251 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:00.874000 audit[4251]: CRED_DISP pid=4251 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:00.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.111:22-147.75.109.163:43394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:05.921234 systemd[1]: Started sshd@9-10.128.0.111:22-147.75.109.163:34746.service. Feb 9 19:29:05.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.111:22-147.75.109.163:34746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:05.928561 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:29:05.928774 kernel: audit: type=1130 audit(1707506945.920:1391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.111:22-147.75.109.163:34746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:06.217000 audit[4267]: USER_ACCT pid=4267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:06.249776 sshd[4267]: Accepted publickey for core from 147.75.109.163 port 34746 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:29:06.250273 kernel: audit: type=1101 audit(1707506946.217:1392): pid=4267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:06.250510 sshd[4267]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:29:06.248000 audit[4267]: CRED_ACQ pid=4267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:06.260303 systemd[1]: Started session-10.scope. Feb 9 19:29:06.262404 systemd-logind[1129]: New session 10 of user core. Feb 9 19:29:06.294356 kernel: audit: type=1103 audit(1707506946.248:1393): pid=4267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:06.294559 kernel: audit: type=1006 audit(1707506946.248:1394): pid=4267 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 19:29:06.248000 audit[4267]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd4224190 a2=3 a3=0 items=0 ppid=1 pid=4267 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:06.325433 kernel: audit: type=1300 audit(1707506946.248:1394): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd4224190 a2=3 a3=0 items=0 ppid=1 pid=4267 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:06.326492 kernel: audit: type=1327 audit(1707506946.248:1394): proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:06.248000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:06.271000 audit[4267]: USER_START pid=4267 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:06.336331 kernel: audit: type=1105 audit(1707506946.271:1395): pid=4267 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:06.276000 audit[4269]: CRED_ACQ pid=4269 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:06.395208 kernel: audit: type=1103 audit(1707506946.276:1396): pid=4269 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:06.545699 sshd[4267]: pam_unix(sshd:session): session closed for user core Feb 9 19:29:06.547000 audit[4267]: USER_END pid=4267 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:06.581370 kernel: audit: type=1106 audit(1707506946.547:1397): pid=4267 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:06.547000 audit[4267]: CRED_DISP pid=4267 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:06.584481 systemd-logind[1129]: Session 10 logged out. Waiting for processes to exit. Feb 9 19:29:06.586744 systemd[1]: sshd@9-10.128.0.111:22-147.75.109.163:34746.service: Deactivated successfully. Feb 9 19:29:06.587950 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 19:29:06.590112 systemd-logind[1129]: Removed session 10. Feb 9 19:29:06.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.111:22-147.75.109.163:34746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:06.607292 kernel: audit: type=1104 audit(1707506946.547:1398): pid=4267 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:06.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.111:22-147.75.109.163:34756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:06.614595 systemd[1]: Started sshd@10-10.128.0.111:22-147.75.109.163:34756.service. Feb 9 19:29:06.900000 audit[4281]: USER_ACCT pid=4281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:06.902798 sshd[4281]: Accepted publickey for core from 147.75.109.163 port 34756 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:29:06.902000 audit[4281]: CRED_ACQ pid=4281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:06.902000 audit[4281]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7bcc4cf0 a2=3 a3=0 items=0 ppid=1 pid=4281 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:06.902000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:06.903798 sshd[4281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:29:06.911098 systemd-logind[1129]: New session 11 of user core. Feb 9 19:29:06.912040 systemd[1]: Started session-11.scope. Feb 9 19:29:06.919000 audit[4281]: USER_START pid=4281 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:06.922000 audit[4283]: CRED_ACQ pid=4283 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:07.429924 sshd[4281]: pam_unix(sshd:session): session closed for user core Feb 9 19:29:07.432000 audit[4281]: USER_END pid=4281 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:07.432000 audit[4281]: CRED_DISP pid=4281 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:07.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.111:22-147.75.109.163:34756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:07.436216 systemd[1]: sshd@10-10.128.0.111:22-147.75.109.163:34756.service: Deactivated successfully. Feb 9 19:29:07.437254 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 19:29:07.439138 systemd-logind[1129]: Session 11 logged out. Waiting for processes to exit. Feb 9 19:29:07.441007 systemd-logind[1129]: Removed session 11. Feb 9 19:29:07.476206 systemd[1]: Started sshd@11-10.128.0.111:22-147.75.109.163:34764.service. Feb 9 19:29:07.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.111:22-147.75.109.163:34764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:07.759000 audit[4291]: USER_ACCT pid=4291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:07.761674 sshd[4291]: Accepted publickey for core from 147.75.109.163 port 34764 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:29:07.761000 audit[4291]: CRED_ACQ pid=4291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:07.761000 audit[4291]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffa5d3bd0 a2=3 a3=0 items=0 ppid=1 pid=4291 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:07.761000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:07.763640 sshd[4291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:29:07.770680 systemd[1]: Started session-12.scope. Feb 9 19:29:07.774345 systemd-logind[1129]: New session 12 of user core. Feb 9 19:29:07.784000 audit[4291]: USER_START pid=4291 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:07.787000 audit[4293]: CRED_ACQ pid=4293 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:08.051284 sshd[4291]: pam_unix(sshd:session): session closed for user core Feb 9 19:29:08.052000 audit[4291]: USER_END pid=4291 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:08.052000 audit[4291]: CRED_DISP pid=4291 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:08.056386 systemd[1]: sshd@11-10.128.0.111:22-147.75.109.163:34764.service: Deactivated successfully. Feb 9 19:29:08.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.111:22-147.75.109.163:34764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:08.057623 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 19:29:08.058659 systemd-logind[1129]: Session 12 logged out. Waiting for processes to exit. Feb 9 19:29:08.059871 systemd-logind[1129]: Removed session 12. Feb 9 19:29:13.130199 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 19:29:13.130393 kernel: audit: type=1130 audit(1707506953.098:1418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.111:22-147.75.109.163:34768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:13.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.111:22-147.75.109.163:34768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:13.099597 systemd[1]: Started sshd@12-10.128.0.111:22-147.75.109.163:34768.service. Feb 9 19:29:13.391000 audit[4310]: USER_ACCT pid=4310 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:13.393445 sshd[4310]: Accepted publickey for core from 147.75.109.163 port 34768 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:29:13.423267 kernel: audit: type=1101 audit(1707506953.391:1419): pid=4310 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:13.424148 sshd[4310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:29:13.422000 audit[4310]: CRED_ACQ pid=4310 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:13.437099 systemd[1]: Started session-13.scope. Feb 9 19:29:13.439596 systemd-logind[1129]: New session 13 of user core. Feb 9 19:29:13.452291 kernel: audit: type=1103 audit(1707506953.422:1420): pid=4310 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:13.422000 audit[4310]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd1fab200 a2=3 a3=0 items=0 ppid=1 pid=4310 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:13.497001 kernel: audit: type=1006 audit(1707506953.422:1421): pid=4310 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 9 19:29:13.497235 kernel: audit: type=1300 audit(1707506953.422:1421): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd1fab200 a2=3 a3=0 items=0 ppid=1 pid=4310 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:13.497293 kernel: audit: type=1327 audit(1707506953.422:1421): proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:13.422000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:13.445000 audit[4310]: USER_START pid=4310 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:13.539214 kernel: audit: type=1105 audit(1707506953.445:1422): pid=4310 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:13.539384 kernel: audit: type=1103 audit(1707506953.456:1423): pid=4312 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:13.456000 audit[4312]: CRED_ACQ pid=4312 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:13.779617 sshd[4310]: pam_unix(sshd:session): session closed for user core Feb 9 19:29:13.780000 audit[4310]: USER_END pid=4310 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:13.784543 systemd-logind[1129]: Session 13 logged out. Waiting for processes to exit. Feb 9 19:29:13.786621 systemd[1]: sshd@12-10.128.0.111:22-147.75.109.163:34768.service: Deactivated successfully. Feb 9 19:29:13.787805 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 19:29:13.789663 systemd-logind[1129]: Removed session 13. Feb 9 19:29:13.821593 kernel: audit: type=1106 audit(1707506953.780:1424): pid=4310 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:13.821760 kernel: audit: type=1104 audit(1707506953.780:1425): pid=4310 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:13.780000 audit[4310]: CRED_DISP pid=4310 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:13.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.111:22-147.75.109.163:34768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:18.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.111:22-147.75.109.163:52820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:18.823985 systemd[1]: Started sshd@13-10.128.0.111:22-147.75.109.163:52820.service. Feb 9 19:29:18.830543 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:29:18.830637 kernel: audit: type=1130 audit(1707506958.823:1427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.111:22-147.75.109.163:52820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:19.113000 audit[4328]: USER_ACCT pid=4328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:19.117247 sshd[4328]: Accepted publickey for core from 147.75.109.163 port 52820 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:29:19.145205 kernel: audit: type=1101 audit(1707506959.113:1428): pid=4328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:19.144000 audit[4328]: CRED_ACQ pid=4328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:19.147134 sshd[4328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:29:19.155594 systemd-logind[1129]: New session 14 of user core. Feb 9 19:29:19.158850 systemd[1]: Started session-14.scope. Feb 9 19:29:19.187958 kernel: audit: type=1103 audit(1707506959.144:1429): pid=4328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:19.188143 kernel: audit: type=1006 audit(1707506959.144:1430): pid=4328 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 9 19:29:19.188334 kernel: audit: type=1300 audit(1707506959.144:1430): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc8eb1160 a2=3 a3=0 items=0 ppid=1 pid=4328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:19.144000 audit[4328]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc8eb1160 a2=3 a3=0 items=0 ppid=1 pid=4328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:19.144000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:19.217215 kernel: audit: type=1327 audit(1707506959.144:1430): proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:19.168000 audit[4328]: USER_START pid=4328 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:19.172000 audit[4330]: CRED_ACQ pid=4330 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:19.259460 kernel: audit: type=1105 audit(1707506959.168:1431): pid=4328 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:19.259526 kernel: audit: type=1103 audit(1707506959.172:1432): pid=4330 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:19.430642 sshd[4328]: pam_unix(sshd:session): session closed for user core Feb 9 19:29:19.432000 audit[4328]: USER_END pid=4328 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:19.466247 kernel: audit: type=1106 audit(1707506959.432:1433): pid=4328 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:19.466419 kernel: audit: type=1104 audit(1707506959.432:1434): pid=4328 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:19.432000 audit[4328]: CRED_DISP pid=4328 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:19.468466 systemd-logind[1129]: Session 14 logged out. Waiting for processes to exit. Feb 9 19:29:19.471162 systemd[1]: sshd@13-10.128.0.111:22-147.75.109.163:52820.service: Deactivated successfully. Feb 9 19:29:19.472377 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 19:29:19.474678 systemd-logind[1129]: Removed session 14. Feb 9 19:29:19.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.111:22-147.75.109.163:52820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:21.301383 systemd[1]: run-containerd-runc-k8s.io-42dbad43519b9b87124343f3bf1302a3c85b9d147bdd3542dd18e890a3705105-runc.VQ8JOU.mount: Deactivated successfully. Feb 9 19:29:24.497533 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:29:24.497664 kernel: audit: type=1130 audit(1707506964.484:1436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.111:22-147.75.109.163:51678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:24.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.111:22-147.75.109.163:51678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:24.485497 systemd[1]: Started sshd@14-10.128.0.111:22-147.75.109.163:51678.service. Feb 9 19:29:24.774000 audit[4362]: USER_ACCT pid=4362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:24.806003 sshd[4362]: Accepted publickey for core from 147.75.109.163 port 51678 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:29:24.806459 kernel: audit: type=1101 audit(1707506964.774:1437): pid=4362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:24.804000 audit[4362]: CRED_ACQ pid=4362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:24.806655 sshd[4362]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:29:24.817291 systemd[1]: Started session-15.scope. Feb 9 19:29:24.820162 systemd-logind[1129]: New session 15 of user core. Feb 9 19:29:24.834200 kernel: audit: type=1103 audit(1707506964.804:1438): pid=4362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:24.804000 audit[4362]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8f3bf600 a2=3 a3=0 items=0 ppid=1 pid=4362 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:24.880669 kernel: audit: type=1006 audit(1707506964.804:1439): pid=4362 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 9 19:29:24.880839 kernel: audit: type=1300 audit(1707506964.804:1439): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8f3bf600 a2=3 a3=0 items=0 ppid=1 pid=4362 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:24.880894 kernel: audit: type=1327 audit(1707506964.804:1439): proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:24.804000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:24.827000 audit[4362]: USER_START pid=4362 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:24.922372 kernel: audit: type=1105 audit(1707506964.827:1440): pid=4362 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:24.922572 kernel: audit: type=1103 audit(1707506964.833:1441): pid=4364 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:24.833000 audit[4364]: CRED_ACQ pid=4364 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:25.094234 sshd[4362]: pam_unix(sshd:session): session closed for user core Feb 9 19:29:25.095000 audit[4362]: USER_END pid=4362 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:25.100577 systemd-logind[1129]: Session 15 logged out. Waiting for processes to exit. Feb 9 19:29:25.102926 systemd[1]: sshd@14-10.128.0.111:22-147.75.109.163:51678.service: Deactivated successfully. Feb 9 19:29:25.104182 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 19:29:25.106648 systemd-logind[1129]: Removed session 15. Feb 9 19:29:25.095000 audit[4362]: CRED_DISP pid=4362 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:25.153806 kernel: audit: type=1106 audit(1707506965.095:1442): pid=4362 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:25.153983 kernel: audit: type=1104 audit(1707506965.095:1443): pid=4362 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:25.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.111:22-147.75.109.163:51678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:25.249914 systemd[1]: run-containerd-runc-k8s.io-7cb5ba0b5e7caada2e54dfcab3dea709918aa5f9cf5584084606cb0aec36854e-runc.sDYFbY.mount: Deactivated successfully. Feb 9 19:29:28.790552 systemd[1]: run-containerd-runc-k8s.io-42dbad43519b9b87124343f3bf1302a3c85b9d147bdd3542dd18e890a3705105-runc.n8QbpL.mount: Deactivated successfully. Feb 9 19:29:30.162778 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:29:30.162924 kernel: audit: type=1130 audit(1707506970.138:1445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.111:22-147.75.109.163:51684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:30.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.111:22-147.75.109.163:51684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:30.139814 systemd[1]: Started sshd@15-10.128.0.111:22-147.75.109.163:51684.service. Feb 9 19:29:30.438000 audit[4416]: USER_ACCT pid=4416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:30.440715 sshd[4416]: Accepted publickey for core from 147.75.109.163 port 51684 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:29:30.470208 kernel: audit: type=1101 audit(1707506970.438:1446): pid=4416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:30.470336 kernel: audit: type=1103 audit(1707506970.468:1447): pid=4416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:30.468000 audit[4416]: CRED_ACQ pid=4416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:30.473883 sshd[4416]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:29:30.491685 systemd[1]: Started session-16.scope. Feb 9 19:29:30.494397 systemd-logind[1129]: New session 16 of user core. Feb 9 19:29:30.513484 kernel: audit: type=1006 audit(1707506970.472:1448): pid=4416 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 19:29:30.513606 kernel: audit: type=1300 audit(1707506970.472:1448): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed68df420 a2=3 a3=0 items=0 ppid=1 pid=4416 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:30.472000 audit[4416]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed68df420 a2=3 a3=0 items=0 ppid=1 pid=4416 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:30.472000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:30.510000 audit[4416]: USER_START pid=4416 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:30.583742 kernel: audit: type=1327 audit(1707506970.472:1448): proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:30.583932 kernel: audit: type=1105 audit(1707506970.510:1449): pid=4416 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:30.583992 kernel: audit: type=1103 audit(1707506970.516:1450): pid=4418 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:30.516000 audit[4418]: CRED_ACQ pid=4418 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:30.775498 sshd[4416]: pam_unix(sshd:session): session closed for user core Feb 9 19:29:30.777000 audit[4416]: USER_END pid=4416 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:30.812225 kernel: audit: type=1106 audit(1707506970.777:1451): pid=4416 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:30.812355 kernel: audit: type=1104 audit(1707506970.777:1452): pid=4416 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:30.777000 audit[4416]: CRED_DISP pid=4416 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:30.818766 systemd[1]: sshd@15-10.128.0.111:22-147.75.109.163:51684.service: Deactivated successfully. Feb 9 19:29:30.819952 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 19:29:30.822623 systemd-logind[1129]: Session 16 logged out. Waiting for processes to exit. Feb 9 19:29:30.824504 systemd-logind[1129]: Removed session 16. Feb 9 19:29:30.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.111:22-147.75.109.163:51684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:30.844930 systemd[1]: Started sshd@16-10.128.0.111:22-147.75.109.163:51696.service. Feb 9 19:29:30.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.111:22-147.75.109.163:51696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:31.128000 audit[4428]: USER_ACCT pid=4428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:31.130456 sshd[4428]: Accepted publickey for core from 147.75.109.163 port 51696 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:29:31.130000 audit[4428]: CRED_ACQ pid=4428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:31.130000 audit[4428]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd98a55590 a2=3 a3=0 items=0 ppid=1 pid=4428 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:31.130000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:31.132689 sshd[4428]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:29:31.139296 systemd-logind[1129]: New session 17 of user core. Feb 9 19:29:31.140722 systemd[1]: Started session-17.scope. Feb 9 19:29:31.148000 audit[4428]: USER_START pid=4428 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:31.150000 audit[4430]: CRED_ACQ pid=4430 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:31.488760 sshd[4428]: pam_unix(sshd:session): session closed for user core Feb 9 19:29:31.490000 audit[4428]: USER_END pid=4428 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:31.490000 audit[4428]: CRED_DISP pid=4428 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:31.494258 systemd[1]: sshd@16-10.128.0.111:22-147.75.109.163:51696.service: Deactivated successfully. Feb 9 19:29:31.495460 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 19:29:31.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.111:22-147.75.109.163:51696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:31.496621 systemd-logind[1129]: Session 17 logged out. Waiting for processes to exit. Feb 9 19:29:31.498043 systemd-logind[1129]: Removed session 17. Feb 9 19:29:31.534743 systemd[1]: Started sshd@17-10.128.0.111:22-147.75.109.163:51700.service. Feb 9 19:29:31.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.111:22-147.75.109.163:51700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:31.820000 audit[4437]: USER_ACCT pid=4437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:31.822639 sshd[4437]: Accepted publickey for core from 147.75.109.163 port 51700 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:29:31.821000 audit[4437]: CRED_ACQ pid=4437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:31.821000 audit[4437]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedd594e90 a2=3 a3=0 items=0 ppid=1 pid=4437 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:31.821000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:31.823618 sshd[4437]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:29:31.830273 systemd-logind[1129]: New session 18 of user core. Feb 9 19:29:31.830709 systemd[1]: Started session-18.scope. Feb 9 19:29:31.838000 audit[4437]: USER_START pid=4437 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:31.840000 audit[4439]: CRED_ACQ pid=4439 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:32.881000 audit[4449]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=4449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:29:32.881000 audit[4449]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffcd1763990 a2=0 a3=7ffcd176397c items=0 ppid=2259 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:32.881000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:29:32.887000 audit[4449]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:29:32.887000 audit[4449]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffcd1763990 a2=0 a3=31030 items=0 ppid=2259 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:32.887000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:29:32.914601 sshd[4437]: pam_unix(sshd:session): session closed for user core Feb 9 19:29:32.915000 audit[4437]: USER_END pid=4437 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:32.915000 audit[4437]: CRED_DISP pid=4437 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:32.920251 systemd-logind[1129]: Session 18 logged out. Waiting for processes to exit. Feb 9 19:29:32.920831 systemd[1]: sshd@17-10.128.0.111:22-147.75.109.163:51700.service: Deactivated successfully. Feb 9 19:29:32.922034 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 19:29:32.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.111:22-147.75.109.163:51700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:32.924626 systemd-logind[1129]: Removed session 18. Feb 9 19:29:32.932000 audit[4452]: NETFILTER_CFG table=filter:115 family=2 entries=32 op=nft_register_rule pid=4452 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:29:32.932000 audit[4452]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd899844a0 a2=0 a3=7ffd8998448c items=0 ppid=2259 pid=4452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:32.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:29:32.934000 audit[4452]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4452 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:29:32.934000 audit[4452]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd899844a0 a2=0 a3=31030 items=0 ppid=2259 pid=4452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:32.934000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:29:32.961941 systemd[1]: Started sshd@18-10.128.0.111:22-147.75.109.163:51706.service. Feb 9 19:29:32.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.111:22-147.75.109.163:51706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:33.248000 audit[4454]: USER_ACCT pid=4454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:33.249760 sshd[4454]: Accepted publickey for core from 147.75.109.163 port 51706 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:29:33.250000 audit[4454]: CRED_ACQ pid=4454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:33.250000 audit[4454]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc119d60e0 a2=3 a3=0 items=0 ppid=1 pid=4454 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:33.250000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:33.251923 sshd[4454]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:29:33.258680 systemd[1]: Started session-19.scope. Feb 9 19:29:33.259301 systemd-logind[1129]: New session 19 of user core. Feb 9 19:29:33.267000 audit[4454]: USER_START pid=4454 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:33.269000 audit[4456]: CRED_ACQ pid=4456 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:33.838090 sshd[4454]: pam_unix(sshd:session): session closed for user core Feb 9 19:29:33.838000 audit[4454]: USER_END pid=4454 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:33.839000 audit[4454]: CRED_DISP pid=4454 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:33.842814 systemd[1]: sshd@18-10.128.0.111:22-147.75.109.163:51706.service: Deactivated successfully. Feb 9 19:29:33.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.111:22-147.75.109.163:51706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:33.844041 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 19:29:33.844942 systemd-logind[1129]: Session 19 logged out. Waiting for processes to exit. Feb 9 19:29:33.846348 systemd-logind[1129]: Removed session 19. Feb 9 19:29:33.884865 systemd[1]: Started sshd@19-10.128.0.111:22-147.75.109.163:51716.service. Feb 9 19:29:33.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.111:22-147.75.109.163:51716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:34.169000 audit[4468]: USER_ACCT pid=4468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:34.171736 sshd[4468]: Accepted publickey for core from 147.75.109.163 port 51716 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:29:34.172000 audit[4468]: CRED_ACQ pid=4468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:34.172000 audit[4468]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc446fc2a0 a2=3 a3=0 items=0 ppid=1 pid=4468 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:34.172000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:34.174567 sshd[4468]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:29:34.182515 systemd[1]: Started session-20.scope. Feb 9 19:29:34.183443 systemd-logind[1129]: New session 20 of user core. Feb 9 19:29:34.191000 audit[4468]: USER_START pid=4468 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:34.193000 audit[4470]: CRED_ACQ pid=4470 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:34.458502 sshd[4468]: pam_unix(sshd:session): session closed for user core Feb 9 19:29:34.460000 audit[4468]: USER_END pid=4468 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:34.460000 audit[4468]: CRED_DISP pid=4468 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:34.464114 systemd[1]: sshd@19-10.128.0.111:22-147.75.109.163:51716.service: Deactivated successfully. Feb 9 19:29:34.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.111:22-147.75.109.163:51716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:34.465305 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 19:29:34.465361 systemd-logind[1129]: Session 20 logged out. Waiting for processes to exit. Feb 9 19:29:34.466938 systemd-logind[1129]: Removed session 20. Feb 9 19:29:39.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.111:22-147.75.109.163:34436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:39.505859 systemd[1]: Started sshd@20-10.128.0.111:22-147.75.109.163:34436.service. Feb 9 19:29:39.536500 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 9 19:29:39.536686 kernel: audit: type=1130 audit(1707506979.505:1494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.111:22-147.75.109.163:34436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:39.796000 audit[4483]: USER_ACCT pid=4483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:39.798011 sshd[4483]: Accepted publickey for core from 147.75.109.163 port 34436 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:29:39.830213 kernel: audit: type=1101 audit(1707506979.796:1495): pid=4483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:39.828000 audit[4483]: CRED_ACQ pid=4483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:39.831655 sshd[4483]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:29:39.842020 systemd[1]: Started session-21.scope. Feb 9 19:29:39.843251 systemd-logind[1129]: New session 21 of user core. Feb 9 19:29:39.857685 kernel: audit: type=1103 audit(1707506979.828:1496): pid=4483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:39.874415 kernel: audit: type=1006 audit(1707506979.829:1497): pid=4483 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 9 19:29:39.829000 audit[4483]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8ca39af0 a2=3 a3=0 items=0 ppid=1 pid=4483 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:39.829000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:39.912238 kernel: audit: type=1300 audit(1707506979.829:1497): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8ca39af0 a2=3 a3=0 items=0 ppid=1 pid=4483 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:39.912388 kernel: audit: type=1327 audit(1707506979.829:1497): proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:39.912449 kernel: audit: type=1105 audit(1707506979.854:1498): pid=4483 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:39.854000 audit[4483]: USER_START pid=4483 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:39.945559 kernel: audit: type=1103 audit(1707506979.857:1499): pid=4485 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:39.857000 audit[4485]: CRED_ACQ pid=4485 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:40.118113 sshd[4483]: pam_unix(sshd:session): session closed for user core Feb 9 19:29:40.118000 audit[4483]: USER_END pid=4483 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:40.123587 systemd[1]: sshd@20-10.128.0.111:22-147.75.109.163:34436.service: Deactivated successfully. Feb 9 19:29:40.124791 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 19:29:40.127146 systemd-logind[1129]: Session 21 logged out. Waiting for processes to exit. Feb 9 19:29:40.128613 systemd-logind[1129]: Removed session 21. Feb 9 19:29:40.119000 audit[4483]: CRED_DISP pid=4483 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:40.177030 kernel: audit: type=1106 audit(1707506980.118:1500): pid=4483 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:40.177255 kernel: audit: type=1104 audit(1707506980.119:1501): pid=4483 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:40.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.111:22-147.75.109.163:34436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:41.300000 audit[4495]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=4495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:29:41.300000 audit[4495]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffd6330560 a2=0 a3=7fffd633054c items=0 ppid=2259 pid=4495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:41.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:29:41.306000 audit[4495]: NETFILTER_CFG table=nat:118 family=2 entries=104 op=nft_register_chain pid=4495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:29:41.306000 audit[4495]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7fffd6330560 a2=0 a3=7fffd633054c items=0 ppid=2259 pid=4495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:41.306000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:29:45.166197 systemd[1]: Started sshd@21-10.128.0.111:22-147.75.109.163:37792.service. Feb 9 19:29:45.214052 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 19:29:45.214240 kernel: audit: type=1130 audit(1707506985.165:1505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.111:22-147.75.109.163:37792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:45.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.111:22-147.75.109.163:37792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:45.463000 audit[4498]: USER_ACCT pid=4498 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:45.474574 sshd[4498]: Accepted publickey for core from 147.75.109.163 port 37792 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:29:45.495294 kernel: audit: type=1101 audit(1707506985.463:1506): pid=4498 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:45.495787 sshd[4498]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:29:45.504484 systemd[1]: Started session-22.scope. Feb 9 19:29:45.505293 systemd-logind[1129]: New session 22 of user core. Feb 9 19:29:45.493000 audit[4498]: CRED_ACQ pid=4498 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:45.534217 kernel: audit: type=1103 audit(1707506985.493:1507): pid=4498 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:45.493000 audit[4498]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc45d9fa50 a2=3 a3=0 items=0 ppid=1 pid=4498 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:45.578780 kernel: audit: type=1006 audit(1707506985.493:1508): pid=4498 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 9 19:29:45.578958 kernel: audit: type=1300 audit(1707506985.493:1508): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc45d9fa50 a2=3 a3=0 items=0 ppid=1 pid=4498 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:45.493000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:45.588722 kernel: audit: type=1327 audit(1707506985.493:1508): proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:45.588872 kernel: audit: type=1105 audit(1707506985.516:1509): pid=4498 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:45.516000 audit[4498]: USER_START pid=4498 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:45.516000 audit[4501]: CRED_ACQ pid=4501 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:45.646237 kernel: audit: type=1103 audit(1707506985.516:1510): pid=4501 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:45.836787 sshd[4498]: pam_unix(sshd:session): session closed for user core Feb 9 19:29:45.838000 audit[4498]: USER_END pid=4498 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:45.847921 systemd[1]: sshd@21-10.128.0.111:22-147.75.109.163:37792.service: Deactivated successfully. Feb 9 19:29:45.849133 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 19:29:45.851062 systemd-logind[1129]: Session 22 logged out. Waiting for processes to exit. Feb 9 19:29:45.852623 systemd-logind[1129]: Removed session 22. Feb 9 19:29:45.838000 audit[4498]: CRED_DISP pid=4498 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:45.873382 kernel: audit: type=1106 audit(1707506985.838:1511): pid=4498 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:45.873445 kernel: audit: type=1104 audit(1707506985.838:1512): pid=4498 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:45.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.111:22-147.75.109.163:37792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:46.410000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:29:46.410000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002583140 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:29:46.410000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:29:46.410000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:29:46.410000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d1c240 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:29:46.410000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:29:46.528000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:29:46.528000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:29:46.528000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0116475c0 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:29:46.528000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:29:46.528000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c011714330 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:29:46.528000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:29:46.532000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:29:46.532000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c011714840 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:29:46.532000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:29:46.572000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:29:46.572000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c012e72e40 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:29:46.572000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:29:46.578000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:29:46.578000 audit[1919]: AVC avc: denied { watch } for pid=1919 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:29:46.578000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c012d5e0c0 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:29:46.578000 audit[1919]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c011e4f220 a2=fc6 a3=0 items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c702,c780 key=(null) Feb 9 19:29:46.578000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:29:46.578000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E313131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:29:49.125002 kubelet[2075]: I0209 19:29:49.124954 2075 topology_manager.go:215] "Topology Admit Handler" podUID="675df830-54ad-44f7-9b86-3527f81e5307" podNamespace="calico-apiserver" podName="calico-apiserver-7546c5677d-qlz7j" Feb 9 19:29:49.137497 systemd[1]: Created slice kubepods-besteffort-pod675df830_54ad_44f7_9b86_3527f81e5307.slice. Feb 9 19:29:49.154619 kubelet[2075]: I0209 19:29:49.154562 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k8zwx\" (UniqueName: \"kubernetes.io/projected/675df830-54ad-44f7-9b86-3527f81e5307-kube-api-access-k8zwx\") pod \"calico-apiserver-7546c5677d-qlz7j\" (UID: \"675df830-54ad-44f7-9b86-3527f81e5307\") " pod="calico-apiserver/calico-apiserver-7546c5677d-qlz7j" Feb 9 19:29:49.155027 kubelet[2075]: I0209 19:29:49.155003 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/675df830-54ad-44f7-9b86-3527f81e5307-calico-apiserver-certs\") pod \"calico-apiserver-7546c5677d-qlz7j\" (UID: \"675df830-54ad-44f7-9b86-3527f81e5307\") " pod="calico-apiserver/calico-apiserver-7546c5677d-qlz7j" Feb 9 19:29:49.177000 audit[4511]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4511 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:29:49.177000 audit[4511]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdd529b3b0 a2=0 a3=7ffdd529b39c items=0 ppid=2259 pid=4511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:49.177000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:29:49.181000 audit[4511]: NETFILTER_CFG table=nat:120 family=2 entries=44 op=nft_register_rule pid=4511 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:29:49.181000 audit[4511]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffdd529b3b0 a2=0 a3=7ffdd529b39c items=0 ppid=2259 pid=4511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:49.181000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:29:49.215000 audit[4513]: NETFILTER_CFG table=filter:121 family=2 entries=9 op=nft_register_rule pid=4513 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:29:49.215000 audit[4513]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc5b0b1e40 a2=0 a3=7ffc5b0b1e2c items=0 ppid=2259 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:49.215000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:29:49.220000 audit[4513]: NETFILTER_CFG table=nat:122 family=2 entries=44 op=nft_register_rule pid=4513 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:29:49.220000 audit[4513]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc5b0b1e40 a2=0 a3=7ffc5b0b1e2c items=0 ppid=2259 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:49.220000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:29:49.256388 kubelet[2075]: E0209 19:29:49.256341 2075 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 19:29:49.256604 kubelet[2075]: E0209 19:29:49.256456 2075 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/675df830-54ad-44f7-9b86-3527f81e5307-calico-apiserver-certs podName:675df830-54ad-44f7-9b86-3527f81e5307 nodeName:}" failed. No retries permitted until 2024-02-09 19:29:49.756429891 +0000 UTC m=+120.004516672 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/675df830-54ad-44f7-9b86-3527f81e5307-calico-apiserver-certs") pod "calico-apiserver-7546c5677d-qlz7j" (UID: "675df830-54ad-44f7-9b86-3527f81e5307") : secret "calico-apiserver-certs" not found Feb 9 19:29:50.046755 env[1144]: time="2024-02-09T19:29:50.046682936Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7546c5677d-qlz7j,Uid:675df830-54ad-44f7-9b86-3527f81e5307,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:29:50.302289 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:29:50.295481 systemd-networkd[1027]: calid9fcfba18a7: Link UP Feb 9 19:29:50.313372 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid9fcfba18a7: link becomes ready Feb 9 19:29:50.314158 systemd-networkd[1027]: calid9fcfba18a7: Gained carrier Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.141 [INFO][4518] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--apiserver--7546c5677d--qlz7j-eth0 calico-apiserver-7546c5677d- calico-apiserver 675df830-54ad-44f7-9b86-3527f81e5307 1138 0 2024-02-09 19:29:49 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7546c5677d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal calico-apiserver-7546c5677d-qlz7j eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid9fcfba18a7 [] []}} ContainerID="2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" Namespace="calico-apiserver" Pod="calico-apiserver-7546c5677d-qlz7j" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--apiserver--7546c5677d--qlz7j-" Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.141 [INFO][4518] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" Namespace="calico-apiserver" Pod="calico-apiserver-7546c5677d-qlz7j" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--apiserver--7546c5677d--qlz7j-eth0" Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.205 [INFO][4530] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" HandleID="k8s-pod-network.2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--apiserver--7546c5677d--qlz7j-eth0" Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.229 [INFO][4530] ipam_plugin.go 268: Auto assigning IP ContainerID="2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" HandleID="k8s-pod-network.2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--apiserver--7546c5677d--qlz7j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002a5880), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", "pod":"calico-apiserver-7546c5677d-qlz7j", "timestamp":"2024-02-09 19:29:50.205593248 +0000 UTC"}, Hostname:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.229 [INFO][4530] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.229 [INFO][4530] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.229 [INFO][4530] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal' Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.233 [INFO][4530] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.246 [INFO][4530] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.253 [INFO][4530] ipam.go 489: Trying affinity for 192.168.110.128/26 host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.255 [INFO][4530] ipam.go 155: Attempting to load block cidr=192.168.110.128/26 host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.261 [INFO][4530] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.128/26 host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.261 [INFO][4530] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.128/26 handle="k8s-pod-network.2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.264 [INFO][4530] ipam.go 1682: Creating new handle: k8s-pod-network.2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166 Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.274 [INFO][4530] ipam.go 1203: Writing block in order to claim IPs block=192.168.110.128/26 handle="k8s-pod-network.2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.281 [INFO][4530] ipam.go 1216: Successfully claimed IPs: [192.168.110.133/26] block=192.168.110.128/26 handle="k8s-pod-network.2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.281 [INFO][4530] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.133/26] handle="k8s-pod-network.2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" host="ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal" Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.282 [INFO][4530] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:29:50.340227 env[1144]: 2024-02-09 19:29:50.282 [INFO][4530] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.110.133/26] IPv6=[] ContainerID="2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" HandleID="k8s-pod-network.2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" Workload="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--apiserver--7546c5677d--qlz7j-eth0" Feb 9 19:29:50.341541 env[1144]: 2024-02-09 19:29:50.284 [INFO][4518] k8s.go 385: Populated endpoint ContainerID="2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" Namespace="calico-apiserver" Pod="calico-apiserver-7546c5677d-qlz7j" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--apiserver--7546c5677d--qlz7j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--apiserver--7546c5677d--qlz7j-eth0", GenerateName:"calico-apiserver-7546c5677d-", Namespace:"calico-apiserver", SelfLink:"", UID:"675df830-54ad-44f7-9b86-3527f81e5307", ResourceVersion:"1138", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 29, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7546c5677d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-7546c5677d-qlz7j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid9fcfba18a7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:29:50.341541 env[1144]: 2024-02-09 19:29:50.284 [INFO][4518] k8s.go 386: Calico CNI using IPs: [192.168.110.133/32] ContainerID="2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" Namespace="calico-apiserver" Pod="calico-apiserver-7546c5677d-qlz7j" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--apiserver--7546c5677d--qlz7j-eth0" Feb 9 19:29:50.341541 env[1144]: 2024-02-09 19:29:50.284 [INFO][4518] dataplane_linux.go 68: Setting the host side veth name to calid9fcfba18a7 ContainerID="2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" Namespace="calico-apiserver" Pod="calico-apiserver-7546c5677d-qlz7j" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--apiserver--7546c5677d--qlz7j-eth0" Feb 9 19:29:50.341541 env[1144]: 2024-02-09 19:29:50.316 [INFO][4518] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" Namespace="calico-apiserver" Pod="calico-apiserver-7546c5677d-qlz7j" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--apiserver--7546c5677d--qlz7j-eth0" Feb 9 19:29:50.341541 env[1144]: 2024-02-09 19:29:50.320 [INFO][4518] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" Namespace="calico-apiserver" Pod="calico-apiserver-7546c5677d-qlz7j" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--apiserver--7546c5677d--qlz7j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--apiserver--7546c5677d--qlz7j-eth0", GenerateName:"calico-apiserver-7546c5677d-", Namespace:"calico-apiserver", SelfLink:"", UID:"675df830-54ad-44f7-9b86-3527f81e5307", ResourceVersion:"1138", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 29, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7546c5677d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-974b7407b6598dc4f93d.c.flatcar-212911.internal", ContainerID:"2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166", Pod:"calico-apiserver-7546c5677d-qlz7j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid9fcfba18a7", MAC:"92:60:5a:c7:99:ab", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:29:50.341541 env[1144]: 2024-02-09 19:29:50.335 [INFO][4518] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166" Namespace="calico-apiserver" Pod="calico-apiserver-7546c5677d-qlz7j" WorkloadEndpoint="ci--3510--3--2--974b7407b6598dc4f93d.c.flatcar--212911.internal-k8s-calico--apiserver--7546c5677d--qlz7j-eth0" Feb 9 19:29:50.377975 env[1144]: time="2024-02-09T19:29:50.377638036Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:29:50.377975 env[1144]: time="2024-02-09T19:29:50.377699266Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:29:50.377975 env[1144]: time="2024-02-09T19:29:50.377721741Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:29:50.378775 env[1144]: time="2024-02-09T19:29:50.378678233Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166 pid=4562 runtime=io.containerd.runc.v2 Feb 9 19:29:50.407000 audit[4573]: NETFILTER_CFG table=filter:123 family=2 entries=59 op=nft_register_chain pid=4573 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:29:50.416469 kernel: kauditd_printk_skb: 37 callbacks suppressed Feb 9 19:29:50.416605 kernel: audit: type=1325 audit(1707506990.407:1526): table=filter:123 family=2 entries=59 op=nft_register_chain pid=4573 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:29:50.419042 systemd[1]: Started cri-containerd-2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166.scope. Feb 9 19:29:50.407000 audit[4573]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffca857d980 a2=0 a3=7ffca857d96c items=0 ppid=3154 pid=4573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:50.454251 systemd[1]: run-containerd-runc-k8s.io-2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166-runc.twlSZR.mount: Deactivated successfully. Feb 9 19:29:50.471465 kernel: audit: type=1300 audit(1707506990.407:1526): arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffca857d980 a2=0 a3=7ffca857d96c items=0 ppid=3154 pid=4573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:50.407000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:29:50.491292 kernel: audit: type=1327 audit(1707506990.407:1526): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:29:50.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.547560 kernel: audit: type=1400 audit(1707506990.504:1527): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.547699 kernel: audit: type=1400 audit(1707506990.504:1528): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.576998 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:29:50.577167 kernel: audit: type=1400 audit(1707506990.504:1529): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.577235 kernel: audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:29:50.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.586088 kernel: audit: type=1400 audit(1707506990.504:1530): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.586242 kernel: audit: backlog limit exceeded Feb 9 19:29:50.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.504000 audit: BPF prog-id=189 op=LOAD Feb 9 19:29:50.517000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.517000 audit[4574]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4562 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:50.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363663643061633837383231653837353062313032633961616333 Feb 9 19:29:50.517000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.517000 audit[4574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4562 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:50.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363663643061633837383231653837353062313032633961616333 Feb 9 19:29:50.517000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.517000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.517000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.517000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.517000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.517000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.517000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.517000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.517000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.517000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.517000 audit: BPF prog-id=190 op=LOAD Feb 9 19:29:50.517000 audit[4574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003aa710 items=0 ppid=4562 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:50.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363663643061633837383231653837353062313032633961616333 Feb 9 19:29:50.525000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.525000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.525000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.525000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.525000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.525000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.525000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.525000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.546000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:29:50.546000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:29:50.546000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027cb400 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:29:50.546000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026d6fa0 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:29:50.546000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:29:50.546000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:29:50.546000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:29:50.546000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026d6fc0 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:29:50.546000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:29:50.546000 audit[1968]: AVC avc: denied { watch } for pid=1968 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:29:50.546000 audit[1968]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027cb420 a2=fc6 a3=0 items=0 ppid=1776 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c483 key=(null) Feb 9 19:29:50.546000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:29:50.525000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.525000 audit: BPF prog-id=191 op=LOAD Feb 9 19:29:50.525000 audit[4574]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003aa758 items=0 ppid=4562 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:50.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363663643061633837383231653837353062313032633961616333 Feb 9 19:29:50.548000 audit: BPF prog-id=191 op=UNLOAD Feb 9 19:29:50.548000 audit: BPF prog-id=190 op=UNLOAD Feb 9 19:29:50.548000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.548000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.548000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.548000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.548000 audit[4574]: AVC avc: denied { perfmon } for pid=4574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.548000 audit[4574]: AVC avc: denied { bpf } for pid=4574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:50.548000 audit[4574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003aab68 items=0 ppid=4562 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:50.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363663643061633837383231653837353062313032633961616333 Feb 9 19:29:50.690947 env[1144]: time="2024-02-09T19:29:50.690857896Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7546c5677d-qlz7j,Uid:675df830-54ad-44f7-9b86-3527f81e5307,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166\"" Feb 9 19:29:50.697206 kubelet[2075]: E0209 19:29:50.697125 2075 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Feb 9 19:29:50.698374 env[1144]: time="2024-02-09T19:29:50.697697312Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:29:50.887865 systemd[1]: Started sshd@22-10.128.0.111:22-147.75.109.163:37804.service. Feb 9 19:29:50.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.111:22-147.75.109.163:37804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:51.172000 audit[4597]: USER_ACCT pid=4597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:51.173312 sshd[4597]: Accepted publickey for core from 147.75.109.163 port 37804 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:29:51.174000 audit[4597]: CRED_ACQ pid=4597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:51.174000 audit[4597]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9d9f44d0 a2=3 a3=0 items=0 ppid=1 pid=4597 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:51.174000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:51.175331 sshd[4597]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:29:51.181872 systemd-logind[1129]: New session 23 of user core. Feb 9 19:29:51.183414 systemd[1]: Started session-23.scope. Feb 9 19:29:51.193000 audit[4597]: USER_START pid=4597 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:51.195000 audit[4599]: CRED_ACQ pid=4599 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:51.304144 systemd[1]: run-containerd-runc-k8s.io-42dbad43519b9b87124343f3bf1302a3c85b9d147bdd3542dd18e890a3705105-runc.xIOnev.mount: Deactivated successfully. Feb 9 19:29:51.487596 sshd[4597]: pam_unix(sshd:session): session closed for user core Feb 9 19:29:51.490000 audit[4597]: USER_END pid=4597 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:51.490000 audit[4597]: CRED_DISP pid=4597 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:51.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.111:22-147.75.109.163:37804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:51.494238 systemd[1]: sshd@22-10.128.0.111:22-147.75.109.163:37804.service: Deactivated successfully. Feb 9 19:29:51.495496 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 19:29:51.496960 systemd-logind[1129]: Session 23 logged out. Waiting for processes to exit. Feb 9 19:29:51.499305 systemd-logind[1129]: Removed session 23. Feb 9 19:29:52.227719 systemd-networkd[1027]: calid9fcfba18a7: Gained IPv6LL Feb 9 19:29:53.597666 env[1144]: time="2024-02-09T19:29:53.597547209Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:29:53.602564 env[1144]: time="2024-02-09T19:29:53.602513695Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:29:53.605582 env[1144]: time="2024-02-09T19:29:53.605535871Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:29:53.608653 env[1144]: time="2024-02-09T19:29:53.608608124Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:29:53.610699 env[1144]: time="2024-02-09T19:29:53.609837062Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 19:29:53.616361 env[1144]: time="2024-02-09T19:29:53.616314971Z" level=info msg="CreateContainer within sandbox \"2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:29:53.653987 env[1144]: time="2024-02-09T19:29:53.653915773Z" level=info msg="CreateContainer within sandbox \"2566cd0ac87821e8750b102c9aac3c8130fc955dfa20d10de762e7f9d81dc166\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"cae9892c3bbb4769a7691fc35716cf79ea79f53c9c761be3c957b61ba70ba24f\"" Feb 9 19:29:53.655299 env[1144]: time="2024-02-09T19:29:53.655261099Z" level=info msg="StartContainer for \"cae9892c3bbb4769a7691fc35716cf79ea79f53c9c761be3c957b61ba70ba24f\"" Feb 9 19:29:53.706553 systemd[1]: Started cri-containerd-cae9892c3bbb4769a7691fc35716cf79ea79f53c9c761be3c957b61ba70ba24f.scope. Feb 9 19:29:53.711151 systemd[1]: run-containerd-runc-k8s.io-cae9892c3bbb4769a7691fc35716cf79ea79f53c9c761be3c957b61ba70ba24f-runc.JTYCiu.mount: Deactivated successfully. Feb 9 19:29:53.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.742000 audit: BPF prog-id=193 op=LOAD Feb 9 19:29:53.743000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.743000 audit[4643]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4562 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:53.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653938393263336262623437363961373639316663333537313663 Feb 9 19:29:53.743000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.743000 audit[4643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4562 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:53.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653938393263336262623437363961373639316663333537313663 Feb 9 19:29:53.743000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.743000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.743000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.743000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.743000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.743000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.743000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.743000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.743000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.743000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.743000 audit: BPF prog-id=194 op=LOAD Feb 9 19:29:53.743000 audit[4643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00039c920 items=0 ppid=4562 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:53.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653938393263336262623437363961373639316663333537313663 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit: BPF prog-id=195 op=LOAD Feb 9 19:29:53.744000 audit[4643]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00039c968 items=0 ppid=4562 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:53.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653938393263336262623437363961373639316663333537313663 Feb 9 19:29:53.744000 audit: BPF prog-id=195 op=UNLOAD Feb 9 19:29:53.744000 audit: BPF prog-id=194 op=UNLOAD Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:29:53.744000 audit: BPF prog-id=196 op=LOAD Feb 9 19:29:53.744000 audit[4643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039cd78 items=0 ppid=4562 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:53.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653938393263336262623437363961373639316663333537313663 Feb 9 19:29:53.814684 env[1144]: time="2024-02-09T19:29:53.814602064Z" level=info msg="StartContainer for \"cae9892c3bbb4769a7691fc35716cf79ea79f53c9c761be3c957b61ba70ba24f\" returns successfully" Feb 9 19:29:54.431000 audit[4672]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=4672 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:29:54.431000 audit[4672]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff1dc86db0 a2=0 a3=7fff1dc86d9c items=0 ppid=2259 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:54.431000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:29:54.435000 audit[4672]: NETFILTER_CFG table=nat:125 family=2 entries=44 op=nft_register_rule pid=4672 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:29:54.435000 audit[4672]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7fff1dc86db0 a2=0 a3=7fff1dc86d9c items=0 ppid=2259 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:54.435000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:29:54.659849 kubelet[2075]: I0209 19:29:54.659806 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7546c5677d-qlz7j" podStartSLOduration=2.741442695 podCreationTimestamp="2024-02-09 19:29:49 +0000 UTC" firstStartedPulling="2024-02-09 19:29:50.692828929 +0000 UTC m=+120.940915725" lastFinishedPulling="2024-02-09 19:29:53.611118547 +0000 UTC m=+123.859205342" observedRunningTime="2024-02-09 19:29:54.658316044 +0000 UTC m=+124.906402853" watchObservedRunningTime="2024-02-09 19:29:54.659732312 +0000 UTC m=+124.907819119" Feb 9 19:29:54.690000 audit[4674]: NETFILTER_CFG table=filter:126 family=2 entries=10 op=nft_register_rule pid=4674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:29:54.690000 audit[4674]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc0e59f970 a2=0 a3=7ffc0e59f95c items=0 ppid=2259 pid=4674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:54.690000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:29:54.693000 audit[4674]: NETFILTER_CFG table=nat:127 family=2 entries=44 op=nft_register_rule pid=4674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:29:54.693000 audit[4674]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc0e59f970 a2=0 a3=7ffc0e59f95c items=0 ppid=2259 pid=4674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:54.693000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:29:54.823000 audit[4653]: AVC avc: denied { watch } for pid=4653 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_29_49.1685080581/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c26,c616 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c26,c616 tclass=file permissive=0 Feb 9 19:29:54.823000 audit[4653]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000adb180 a2=fc6 a3=0 items=0 ppid=4562 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c26,c616 key=(null) Feb 9 19:29:54.823000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:29:55.257993 systemd[1]: run-containerd-runc-k8s.io-7cb5ba0b5e7caada2e54dfcab3dea709918aa5f9cf5584084606cb0aec36854e-runc.2GXI0G.mount: Deactivated successfully. Feb 9 19:29:56.535482 systemd[1]: Started sshd@23-10.128.0.111:22-147.75.109.163:45796.service. Feb 9 19:29:56.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.111:22-147.75.109.163:45796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:56.542061 kernel: kauditd_printk_skb: 155 callbacks suppressed Feb 9 19:29:56.542313 kernel: audit: type=1130 audit(1707506996.535:1581): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.111:22-147.75.109.163:45796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:29:56.825000 audit[4700]: USER_ACCT pid=4700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:56.856785 sshd[4700]: Accepted publickey for core from 147.75.109.163 port 45796 ssh2: RSA SHA256:2enIA9a+Ie+oz8jW4x9GsRBGLqIoWe8fFi/jhwNVhOs Feb 9 19:29:56.857299 kernel: audit: type=1101 audit(1707506996.825:1582): pid=4700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:56.857541 sshd[4700]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:29:56.855000 audit[4700]: CRED_ACQ pid=4700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:56.866569 systemd[1]: Started session-24.scope. Feb 9 19:29:56.867587 systemd-logind[1129]: New session 24 of user core. Feb 9 19:29:56.886561 kernel: audit: type=1103 audit(1707506996.855:1583): pid=4700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:56.886698 kernel: audit: type=1006 audit(1707506996.855:1584): pid=4700 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 19:29:56.901376 kernel: audit: type=1300 audit(1707506996.855:1584): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9b58e750 a2=3 a3=0 items=0 ppid=1 pid=4700 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:56.855000 audit[4700]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9b58e750 a2=3 a3=0 items=0 ppid=1 pid=4700 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:29:56.855000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:56.930220 kernel: audit: type=1327 audit(1707506996.855:1584): proctitle=737368643A20636F7265205B707269765D Feb 9 19:29:56.875000 audit[4700]: USER_START pid=4700 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:56.973186 kernel: audit: type=1105 audit(1707506996.875:1585): pid=4700 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:56.881000 audit[4702]: CRED_ACQ pid=4702 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:56.997623 kernel: audit: type=1103 audit(1707506996.881:1586): pid=4702 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:57.166894 sshd[4700]: pam_unix(sshd:session): session closed for user core Feb 9 19:29:57.168000 audit[4700]: USER_END pid=4700 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:57.168000 audit[4700]: CRED_DISP pid=4700 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:57.204303 systemd[1]: sshd@23-10.128.0.111:22-147.75.109.163:45796.service: Deactivated successfully. Feb 9 19:29:57.205552 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 19:29:57.207933 systemd-logind[1129]: Session 24 logged out. Waiting for processes to exit. Feb 9 19:29:57.209712 systemd-logind[1129]: Removed session 24. Feb 9 19:29:57.227939 kernel: audit: type=1106 audit(1707506997.168:1587): pid=4700 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:57.228119 kernel: audit: type=1104 audit(1707506997.168:1588): pid=4700 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:29:57.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.111:22-147.75.109.163:45796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'